Cyber Security
Cyber Security
Cyber Security
A Regulatory Digest∗
August 2018
This Digest is intended to be a live, periodically updated compilation of recent laws, regulations,
guidelines and other significant documents on cybersecurity for the financial sector; it is,
therefore, organized in reverse chronological order, with the most recent document first. The
Digest is not meant to be comprehensive of everything published by all jurisdictions and
international bodies. The explanatory summaries are composed of text extracted from the
documents and includes links to the original documents or websites that contained them at the
time of including them in the Digest. A separate “Appendix” file includes an “Index by Concepts”
and a “Source Table.”
The Digest has been compiled and it is being maintained by Aquiles A. Almansi (Lead Financial
Sector Specialist, GFCEW), Yejin Carol Lee (Senior Financial Sector Specialist, GFCFS), and
Jiemin Ren (Consultant).
Financial Sector’s Cybersecurity: A Regulatory Digest
CONTENTS
TABLES .............................................................................................................................. 7
TABLE 1. Documents from Single Jurisdictions ......................................................................... 7
TABLE 2. Documents from the European Union...................................................................... 11
TABLE 3. Documents from Multilateral Institutions .............................................................. 11
INTRODUCTION ............................................................................................................ 13
DOCUMENTS .................................................................................................................. 15
(in reverse chronological order)...................................................................................... 15
1. ECB TIBER-EU Framework & Services Procurement Guidelines: (Aug 2018 &
May 2018) ....................................................................................................................................... 15
2. IIF Cloud Computing paper (Part 1) (Aug 2018) ............................................................. 15
3. NIST Small Business Cybersecurity Act (Aug 2018) ...................................................... 16
4. UK Minimum Cyber Security Standard (Jun 2018) ......................................................... 16
5. Canada’s updated Cyber Security Strategy (Jun 2018) ................................................. 17
6. FFIEC Joint Statement - Cyber Insurance and Its Potential Role in Risk
Management Programs (Apr 2018) ...................................................................................... 18
7. IIF Staff Paper on Addressing Cybersecurity Regulatory Fragmentation (Apr
2018) ................................................................................................................................................. 18
8. NIST Framework for Improving Critical Infrastructure Cybersecurity Version
1.1 (Apr 2018) ............................................................................................................................... 18
9. Swiss national strategy for protection against cyber risks (Apr 2018) .................. 19
10. Singapore Cybersecurity Act (Mar 2018) ........................................................................... 19
11. BaFin specifies BAIT (Feb 2018) ............................................................................................ 20
12. EBA Final Report – Guidelines on ICT Risk Assessment under the Supervisory
Review and Evaluation Process (SREP) (Jan 2018) ........................................................ 21
13. ECB (SSM) Cyber Incident Reporting Framework (2017) ........................................... 21
14. BaFin Banking Supervisory requirement for IT of banks (Nov 2017) .................... 21
15. DNB TIBER-NL Guidance 2.0 (Nov 2017) ........................................................................... 22
16. SFC Guidelines for Reducing and Mitigating Hacking Risks Associated with
Internet Trading (Oct 2017) .................................................................................................... 23
17. FSB Stocktake and Summary Report on Financial Sector Cybersecurity
Regulations, Guidance and Supervisory Practices (Oct 2017) ................................... 23
18. G-7 Follow-up guidance on Fundamental Elements for Effective Assessment of
Cybersecurity in the Financial Sector (Oct 2017)............................................................ 24
2
Financial Sector’s Cybersecurity: A Regulatory Digest
3
Financial Sector’s Cybersecurity: A Regulatory Digest
4
Financial Sector’s Cybersecurity: A Regulatory Digest
78. ISO/IEC - IT, Security Techniques, InfoSec Management Systems (Feb 2016).... 55
79. EU Payment Services Directive 2 (Jan 2016) .................................................................... 56
80. South Africa National Cybersecurity Policy Framework (Dec 2015) ...................... 57
81. France National Digital Security Strategy (Oct 2015) .................................................... 58
82. MAS Circular - Tech Risk and Cybersecurity Training for Board (Oct 2015) ....... 58
83. HKMA Supervisory Policy Manual, Risk Management of E-banking (Sep 2015) 58
84. Japan’s National Center of Incident Readiness and Strategy for Cybersecurity
(Sep 2015) ....................................................................................................................................... 58
85. MAS Circular on Early Detection of Cyber Intrusions (Aug 2015) ............................ 59
86. SEBI Cyber Security and Cyber Resilience framework of Stock Exchanges,
Clearing Corporation and Depositories (Jul 2015) ......................................................... 59
87. JFSA Policy Approaches to Strengthen Cyber Security in the Financial Sector (Jul
2015) ................................................................................................................................................. 59
88. APRA Information Paper: Outsourcing involving Shared Computing Services
(including Cloud) (Jul 2015) .................................................................................................... 60
89. UK FCA/PRA Senior Managers and Certification Regime (Jul 2015) ....................... 60
90. SFC Circular to all Licensed Corporations on Internet Trading (Jun 2015) .......... 61
91. SEC Investment Management Guidance Update on Cybersecurity Guidance (Apr
2015) ................................................................................................................................................. 62
92. Central Bank of Israel Directive on Cyber-Defense Management (Mar 2015) ..... 62
93. ASIC’s Report on Cyber Resilience (Mar 2015) ................................................................ 63
94. EBA Guidelines on Security of Internet Payments (Dec 2014) .................................. 63
95. Japan’s Basic Act on Cybersecurity (Nov 2014) ............................................................... 63
96. CODISE publishes new Guide (May 2014).......................................................................... 64
97. Russian banking system standard on information security maintenance (Apr
2014) ................................................................................................................................................. 64
98. MAS Notice on Technology Risk Management (Mar 2014) ......................................... 65
99. Spain National Cyber Security Strategy (Dec 2013) ....................................................... 65
100.Netherlands National Cyber Security Strategy (Oct 2013) .......................................... 65
101.OSFI Cyber Security Self-Assessment Guidance (Oct 2013) ........................................ 66
102.ASIC REGULATORY GUIDE 172: Australian market licences: Australian
operators (Sep 2013) .................................................................................................................. 66
103.ACPR guidance: risks associated with cloud computing (Jul 2013) ......................... 67
104.MAS Technology Risk Management Guideline (Jun 2013) .......................................... 67
5
Financial Sector’s Cybersecurity: A Regulatory Digest
6
Financial Sector’s Cybersecurity: A Regulatory Digest
TABLES
TABLE 1. Documents from Single Jurisdictions
Australian Securities & Mar 2016 Cyber resilience assessment report: ASX Group and
Investment Commission (ASIC) Chi-X Australia Pty Ltd
APRA Jul 2015 Outsourcing involving Shared Computing Services
French Autorité de Contrôle Jul 2013 ACPR guidance: risks associated with cloud
Prudentiel et de Résolution computing
(ACPR)
7
Financial Sector’s Cybersecurity: A Regulatory Digest
Hong Kong Securities and Oct 2017 SFC Guidelines for Reducing and Mitigating Hacking
Futures Commission (HK SFC) Risks Associated with Internet Trading
HK SFC Dec 2016 HK SFC Circular on augmenting accountability of
senior management
Hong Kong Monetary Authority Dec 2016 HKMA Enhanced Competency Framework (ECF) on
(HKMA) Cybersecurity
HKMA Dec 2016 HKMA Circular on the Cyber-security Fortification
Initiative
HK SFC Oct 2016 HK SFC Review of cyber-security of online and
mobile trading systems
HKMA May 2016 HKMA Circular Security controls related to Internet
banking services
HKMA Sep 2015 HKMA Supervisory Policy Manual, Risk
Management of E-banking
HK SFC Jun 2015 SFC Circular to all Licensed Corporations on Internet
Trading
Indian computer emergency May 2017 Report of India's Working Group for Setting up of a
response team (CERT-In) financial sector CERT
Insurance Regulatory and Apr 2017 IRDAI Guidelines on Information and Cyber Security
Development Authority of India for insurers
(IRDAI)
Reserve Bank of India (RBI) Sep 2016 India Non-Banking Financial Company - Account
Aggregators
Institute for Development and Jul 2016 IDRBT Cyber Security Checklist
Research in Banking
Technology (IDRBT)
RBI Jun 2016 RBI Circular to Establish Cyber Security Framework
in Banks
Securities and Exchange Board Jul 2015 SEBI Cyber Security and Cyber Resilience
of India (SEBI) framework of Stock Exchanges, Clearing Corporation
and Depositories
Japan’s National Center of Sep 2015 Japan’s National Center of Incident Readiness and
Incident Readiness and Strategy Strategy for Cybersecurity
for Cybersecurity
Japanese Financial Services Jul 2015 JFSA Policy Approaches to Strengthen Cyber
Agency (JFSA) Security in the Financial Sector
8
Financial Sector’s Cybersecurity: A Regulatory Digest
South African Reserve Bank May 2017 SARB Guidance to banks on cyber resilience
(SARB)
South African Ministry of State Dec 2015 South Africa National Cybersecurity Policy
Security Framework
Turkey 2016, 2013 Turkey National Cyber Security Strategy and Action
Plan
9
Financial Sector’s Cybersecurity: A Regulatory Digest
US Securities and Exchange Aug 2017 US SEC Cybersecurity Examination Initiative Risk
Commission (SEC) Alert
US FFIEC May 2017 FFIEC Cybersecurity Assessment Tool
New York Department of Mar 2017 New York cyber-security requirements for financial
Financial Services services companies
US NIST Jan 2017 US NIST draft updated Framework for Improving
Critical Infrastructure Cyber-security
US Treasury Financial Crimes Oct 2016 US FinCEN Advisory on FIs obligations on cyber-
Enforcement Network related events and crimes
US Federal Banking Agencies Oct 2016 US Federal Banking Agencies ANPR for enhanced
cyber-security standards
US SEC Apr 2015 SEC Investment Management Guidance Update on
Cybersecurity Guidance
US FFIEC Jun 2011 FFIEC - Supplement to Authentication in an Internet
Banking Environment
10
Financial Sector’s Cybersecurity: A Regulatory Digest
European Central Bank Aug 2018; ECB TIBER-EU Framework & Services Procurement
(ECB) May 2018 Guidelines
European Banking Jan 2018 EBA Final Report -- Guidelines on ICT Risk Assessment
Authority (EBA) under the Supervisory Review and Evaluation Process
(SREP)
European Commission Sep 2017 EC Legislative proposal on a Framework for Free Flow of
(EC) Non-Personal Data in the EU
EC Sep 2017 EC Legislative proposal on ENISA and cybersecurity
certification framework
ECB 2017 ECB (SSM) Cyber Incident Reporting Framework (2017)
EU Agency for Network Jun 2017 ENISA Cyber Europe 2016: After Action Report
and Information Security
(ENISA)
EU Parliament May 2017 EU Parliament Report on influence of technology on future
of financial sector
ESAs (EBA, EIOPA, Apr 2017 ESAs Report on main risks for the EU Financial System
ESMA)
EC Mar 2017 EU Commission Consultation on the impact of FinTech
ENISA Aug 2016 ENISA Strategies for Incident Response and Cyber Crisis
Cooperation
EC Jul 2016 EU Directive on Security of Network and Information
Systems
EBA Jun 2016 EBA ICT risk guidelines
EC Apr 2016 EU General Data Protection Regulation
EC Jan 2016 EU Payment Services Directive 2
EBA Dec 2014 EBA Guidelines on Security of Internet Payments
ENISA Dec 2009 ENISA National Exercise Good Practice Guide
ENISA Dec 2009 ENISA Good Practice Guide on Incident Reporting
11
Financial Sector’s Cybersecurity: A Regulatory Digest
International Organization Feb 2016 ISO/IEC Standards on IT, Security Techniques, Information
for Standardization (ISO)/ Security Management Systems
International
Electrotechnical
Commission (IEC)
World Bank Group Sep 2011 World Bank Financial Infrastructure Series - General
Principles for Credit Reporting
Basel Committee on Banking Jun 2011 BCBS Principles for the Sound Management of Operational
Supervision Risk
AICPA Apr 2010 AICPA suite of SOC & Implementation Guidance
12
Financial Sector’s Cybersecurity: A Regulatory Digest
INTRODUCTION
This second edition of the Regulatory Digest on Financial Sector Cybersecurity compiled
by the Vienna-based World Bank’s Financial Sector Advisory Center (FinSAC) includes
twice as many entries as the first edition from October 2017. This substantial coverage
was possible thanks to the FSB’s Stocktake and Summary Report on Financial Sector
Cybersecurity Regulations, Guidance and Supervisory Practices, also published in
October 2017. Additionally, the following new publications have appeared so far in 2018:
The European Central Bank (ECB) released in May the TIBER-EU Framework:
How to implement the European framework for Threat Intelligence-based Ethical
Red Teaming and published in August Services Procurement Guidelines
prescribing the use of specialist external threat intelligence (TI) and red team (RT)
providers with the highest level of skills, expertise and experience.
The Institute of International Finance (IIF) published in August the first part of its
3-part series on Cloud technology in the financial services industry. It examines
the key opportunities and risks (and mitigants) of migrating to the cloud, as well
as the business and operational risks that arise from not doing so.
The UK government released in June a “Minimum Cyber Security Standard,”
defining the measures that its Departments must implement to meet their National
Cyber Security Strategy obligations.
The Federal Financial Institutions Examination Council (FFIEC) members
released a joint statement in April on cyber insurance and its potential role in risk
management programs.
This Institute of International Finance (IIF) published “Addressing regulatory
fragmentation to support a cyber-resilient global financial services industry” in
April. This staff paper evaluates the regulatory approaches around the world,
identifies areas where regulatory fragmentation is occurring and discusses how a
consistent and coordinated global regulatory landscape could be designed to help
both reduce the current fragmentation and avoid creating new sources of it. The
paper also advocates for the Financial Stability Board to play a predominant role
in creating that regulatory landscape.
The National Institute of Standards and Technology (NIST) released in April
version 1.1 of its Framework for Improving Critical Infrastructure Cybersecurity,
also known as the NIST Cybersecurity Framework. This often-referenced work
refines, clarifies, and enhances version 1.0 issued in 2014, incorporating two drafts
revised during 2017 and 2018. The NIST Small Business Cybersecurity Act also
became law in August 2018.
Switzerland's Federal Council published in April the second national cybersecurity
strategy (NCS) covering 2018 to 2022. This strategy supports cooperation between
public authorities, the private sector, and operators of critical infrastructure to
13
Financial Sector’s Cybersecurity: A Regulatory Digest
14
Financial Sector’s Cybersecurity: A Regulatory Digest
DOCUMENTS
(in reverse chronological order)
1. ECB TIBER-EU Framework & Services Procurement Guidelines: (Aug 2018 &
May 2018)
In May, ECB released a single Europe-wide framework for controlled cyber hacking to
test resilience of financial market entities called "TIBER-EU FRAMEWORK: How to
implement the European framework for Threat Intelligence-based Ethical Red Teaming".
A related Services Procurement Guideline followed in August.
The Framework is “designed for national and European authorities and entities that form
the core financial infrastructure, including entities with cross-border activities which fall
within the regulatory remit of several authorities. The framework can be used for any type
of financial sector entity, as well as entities in other sectors.
It is up to the relevant authorities and the entities themselves to determine if and when
TIBER-EU based tests are performed. Tests will be tailor-made and will not result in a
pass or fail – rather they will provide the tested entity with insight into its strengths and
weaknesses, and enable it to learn and evolve to a higher level of cyber maturity."
Given the risks to such tests, the ECB further published Services Procurement Guidelines:
“To ensure a controlled and safe test, one prescribed control is the use of specialist
external threat intelligence (TI) and red team (RT) providers, which have the highest level
of skills and expertise, and have the requisite experience in threat intelligence and red
team testing in the financial services industry...”
The Guidelines “set out the requirements and standards that must be met by TI and RT
providers to deliver recognised TIBER-EU tests; offer guiding principles and selection
criteria for entities, as they look to procure services from prospective providers; and
provide questions and agreement checklists that could be used when entities undertake
their due diligence and look to formalise the procurement process with the TI/RT
providers.”
The Institute of International Finance (IIF) published the first part of its 3-part series on
Cloud technology in the financial services industry. “This paper examines the key
15
Financial Sector’s Cybersecurity: A Regulatory Digest
The National Institute of Standards and Technology (NIST) Small Business Cybersecurity
Act introduced March 2017 became law in August 2018. The Act will be “… require the
Director of the National Institute of Standards and Technology to disseminate guidance
to help reduce small business cybersecurity risks …”
4. UK Minimum Cyber Security Standard (Jun 2018)
The UK government released a “UK Minimum Cyber Security Standard”, which “defines
the minimum security measures that Departments shall implement with regards to
protecting their information, technology and digital services to meet their [Security Policy
Framework] and National Cyber Security Strategy obligations.”
The Standard includes ten requirements of all Departments (including “organisations,
agencies, Arm’s Length Bodies and contractors”), split into five areas:
“IDENTIFY
1. Departments shall put in place appropriate cyber security governance processes.
2. Departments shall identify and catalogue sensitive information they hold.
3. Departments shall identify and catalogue the key operational services they provide.
4. The need for users to access sensitive information or key operational services shall
be understood and continually managed.
PROTECT
5. Access to sensitive information and key operational services shall only be
provided to identified, authenticated and authorised users or systems.
6. Systems which handle sensitive information or key operational services shall be
protected from exploitation of known vulnerabilities.
7. Highly privileged accounts should not be vulnerable to common cyber-attacks.
DETECT
8. Departments shall take steps to detect common cyber-attacks.
RESPOND
9. Departments shall have a defined, planned and tested response to cyber security
incidents that impact sensitive information or key operational services.
RECOVER
10. Departments shall have well defined and tested processes in place to ensure the
continuity of key operational services in the event of failure or compromise.”
16
Financial Sector’s Cybersecurity: A Regulatory Digest
As the first technical standard (which will be incorporated into the Government Functional
Standard for Security once published), the Minimum Cyber-security Standard references
the National Cyber Security Strategy (See coverage in Digest.)and the HMG Security
Policy Framework (SPF). The SPF, published in final version in May 2018, provides the
mandatory protective security outcomes that all Departments are required to achieve in
the following areas: Good Governance; Culture and Awareness; Risk Management;
Information; Technology and Services; Personnel Security; Physical Security; Preparing
for and Responding to Security Incidents. It details the Policy Priorities in three areas:
Information Security; Physical Security; and Personnel Security and National Security
Vetting. Further, it notes:
“HMG organisations will consult the full range of policy, advice and guidance provided
by the Cabinet Office, Centre for the Protection of National Infrastructure, National Cyber
Security Centre, and other sources of good practice to shape their business specific
approaches, mindful that:
Government organisations know their own business best, including how local risks
should be managed to support operations and services.
Permanent Secretaries/Heads of Department are accountable to Parliament for the
security of their organisations.
An annual reporting process (the Security Risk Management Overview) will
ensure compliance and an appropriate level of commonality across government.”
5. Canada’s updated Cyber Security Strategy (Jun 2018)
Canada’s new National Cyber Security Strategy, published in June 2018, replaced the
2010 Strategy. Renewing its commitment to strong cyber security, it recognizes
“evolving threats, emerging opportunities, and the need for collaborative action” in three
thematic areas:
The update comes after an online public consultation which was undertaken by the
Government in 2016, with a report published in January 2017. “… three ideas were
consistently raised as being important and relevant to cyber security in Canada: privacy,
17
Financial Sector’s Cybersecurity: A Regulatory Digest
collaboration, and using skilled cyber security personnel. Across the full range of
consultation topics, participants stressed the need to uphold all Canadians’ privacy rights,
the need for stakeholders to collaborate with one another (i.e., governments, private sector,
law enforcement, academia, non-profit organizations), and the need to rely on cyber
security experts. In addition to these three ideas that permeated the results, the
Government of Canada cyber security consultation yielded recommendations on specific
areas for action, needs and means, and barriers and constraints…” There was also an
Action Plan covering the years 2010-2015 stemming from the Strategy. (FSB-STi)
6. FFIEC Joint Statement - Cyber Insurance and Its Potential Role in Risk
Management Programs (Apr 2018)
The National Institute of Standards and Technology (NIST) released the final Version 1.1
of its “Framework for Improving Critical Infrastructure Cybersecurity” also known as the
NIST Cybersecurity Framework. This often-referenced work refines, clarifies, and
18
Financial Sector’s Cybersecurity: A Regulatory Digest
enhances Version 1.0, which was issued in February 2014 and incorporates two drafts
revised during 2017 and 2018.
The Framework is intended to be implemented by first-time and current Framework users,
with explicit objective to be compatible to Version 1.0 “with minimal or no disruption”.
It makes the following updates: “Clarified that terms like compliance can be confusing
and mean something very different to various Framework stakeholders; A new section on
self-assessment; Greatly expanded explanation of using Framework for Cyber Supply
Chain Risk Management purposes; Refinements to better account for authentication,
authorization, and identity proofing; Better explanation of the relationship between
Implementation Tiers and Profiles; and Consideration of Coordinated Vulnerability
Disclosure.”
9. Swiss national strategy for protection against cyber risks (Apr 2018)
In April 2018, the second national strategy for protection of Switzerland against cyber
risks (NCS) was published by the Federal Council covering 2018 to 2022. “It builds on
the first NCS implemented from 2012 to 2017; further develops it in line with
Switzerland's vulnerabilities, the significantly changed and intensified threat situation
since 2012, and the foreseeable future development thereof; and it supplements it with
further measures. It thus provides the strategic framework for improving prevention, early
identification, response, and resilience in all areas relevant to cyber risks.”
The strategic goals of the NCS is to support cooperation between public authorities, the
private sector and operators of critical infrastructure in order to ensure early identification
of cyber threats, improve the resilience of critical infrastructure and minimize cyber risks.
(FSB-STi)
2. Authorise CSA to prevent and respond to cybersecurity threats and incidents. The Act
empowers the Commissioner of Cybersecurity to investigate cybersecurity threats and
incidents to determine their impact and prevent further harm or cybersecurity incidents
19
Financial Sector’s Cybersecurity: A Regulatory Digest
from arising. The powers that may be exercised are calibrated according to the severity of
the cybersecurity threat or incident and measures required for response. This assures
Singaporeans that the Government can respond effectively to cybersecurity threats and
keep Singapore and Singaporeans safe.
3. Establish a framework for sharing cybersecurity information. The Act also facilitates
information sharing, which is critical as timely information helps the government and
owners of computer systems identify vulnerabilities and prevent cyber incidents more
effectively. The Act provides a framework for CSA to request information, and for the
protection and sharing of such information.
Part 1 introduces the fundamental concepts used in the Act and provides for the
application of the Act.
Part 2 provides for the administration of the Act and the appointment of a Commissioner
of Cybersecurity (Commissioner) and other officers for the purposes of the Act.
Part 3 provides for the designation of CII and the regulation of owners of CII with regard
to the cybersecurity of the CII.
Part 4 provides for the taking of measures to prevent, manage and respond to cybersecurity
threats and incidents in Singapore.
Part 5 provides for the licensing of providers of licensable cybersecurity services.
Part 6 contains general provisions."
The German Federal Financial Supervisory Authority (BaFin) published a more robust
version of its supervisory requirements for IT in financial institutions (BAIT, released in
November 2017; see coverage in Digest), setting up its requirements in a ‘modular’
format. It explains: “The BAIT have now become the cornerstone of IT supervision for
all credit and financial services institutions in Germany. The requirements are directed at
the management boards of such companies.
The objective of the BAIT is to create a comprehensible and flexible framework for the
management of IT resources, information risk and information security. They also aim to
contribute towards increasing awareness of IT risks throughout the institutions and in
relation to external service providers. Furthermore, they provide transparency about what
banking supervisors expect from the institutions with regard to the management and
monitoring of IT operations, including the user access management that this necessitates
20
Financial Sector’s Cybersecurity: A Regulatory Digest
12. EBA Final Report – Guidelines on ICT Risk Assessment under the Supervisory
Review and Evaluation Process (SREP) (Jan 2018)
European Banking Authority (EBA)’s Final Report of the Guidelines, published in May
2017 (see coverage in the Digest), went into application from 1January 2018. Authorities
indicated compliance by 13 November 2017 (compliance table).
“These Guidelines set out the requirements competent authorities should apply in their
assessment of ICT focusing on the general provisions and application of scoring as part
of the SREP assessment of risks to capital (Title 1), assessment of institutions’ governance
and strategy on ICT (Title 2); and assessment of institutions’ ICT risk exposures and
controls (Title 3).
In particular, Title 1 of these Guidelines explains how the assessment of ICT risk
contributes to the overall SREP assessment of an institution, noting that the assessment
of ICT risk would contribute (1) to the assessment of operational risk, which is assessed
as part of the assessment of risks to capital (Title 6 of the EBA SREP Guidelines), (2) the
assessment of institutions’ governance and strategy on ICT would feed into the
assessment of internal governance and institution-wide controls under Title 5 of the EBA
SREP Guidelines, and (3) the assessment of all aspects of ICT covered by these
Guidelines would also inform the business model analysis performed in accordance with
Title 4 of the EBA SREP Guidelines…”
The European Central Bank (ECB) is finalizing a reporting framework for significant
cyber incidents which was piloted in 2016, with plans to be rolled out to all significant
institutions from the 19 euro area countries in the third quarter of 2017. “The reporting
framework for significant cyber incidents is designed to collect and store information on
cybercrime incidents that have an impact on significant institutions. This will require
incidents to be reported as soon as the banks detect them. The information will be used to
identify and monitor trends in cyber incidents affecting significant institutions and will
facilitate a fast reaction by the ECB in the event that a major incident affects one or more
significant banks…” A pilot exercise has resulted in improvements to the framework
including incident definitions, the reporting template, and the reporting instructions.
The German Federal Financial Supervisory Authority (BaFin) published circular 10/2017,
laying out a principles-based guidance for banking institutions, Bankaufsichtliche
Anforderungen an die Its (BAIT). The Circular is based on the German Banking Act and
the Minimum Requirement for Risk Management, which deals with banks’ operational
risk.
21
Financial Sector’s Cybersecurity: A Regulatory Digest
“This Circular provides a flexible and practical framework for institutions’ technical and
organisational resources on the basis of section 25a (1) of the German Banking Act
(Kreditwesengesetz) – in particular for IT resource management and IT risk management.
Moreover, it specifies the requirements laid down in section 25b of the Banking Act
(outsourcing of activities and processes)… This is without prejudice to the requirements
contained in the Minimum Requirements for Risk Management (Mindestanforderungen
an das Risikomanagement – MaRisk), which are fleshed out in this Circular.”
De Nederlandsche Bank (the Dutch Central Bank/DNB) published its guidance on how to
conduct a Threat Intelligence-based Ethical Red teaming: the TIBER-NL test. The DNB
was charged by the Dutch Financial Stability Committee to lead the implementation of
the TIBER-NL framework, a joint effort of all Dutch Financial Core Infrastructure (FCI)
institutions, which officially started on 30 June 2016.
“TIBER tests mimic potential attacks from real threat actors. The test mimics high level
threat groups only (organised crime groups / state proxy/ nation state attackers) and
thereby tests whether defensive measures taken are effective (capability assessment),
supplementing the present periodic information security audits (process assessments) by
e.g. supervisors and overseers. The tests also supplement current penetration tests and
vulnerability scans executed within FCI parties. Test scenarios will draw on current
commercially obtained threat intelligence that will where possible be enriched and
reviewed with Governmental Intelligence (GI). This testing method aims to determine,
and importantly serves to improve the capabilities of targeted institutions. The TIBER-
NL framework is intended to improve their cyber resilience and ultimately, the cyber
resilience of the FCI as a whole. TIBER-NL testing will be a recurrent exercise.
A TIBER test can therefore be defined as: the highest possible level of intelligence-based
red teaming exercise using the same Tactics, Techniques and Procedures (TTPs) as real
adversaries, against live critical production infrastructure, without the foreknowledge of
the organisation’s defending Blue Team (BT). As such, the BT is unaware of the TIBER-
NL test. The actual test consists of time boxed phases (recon, in, through, out). As a
consequence existing controls, prevention measures, and security detection and response
capabilities against advanced attacks can be tested throughout all phases of the attack. It
also helps identify weaknesses, errors or other security issues in a controlled manner.
The test phase is followed by full disclosure and a replay (that may include purple
teaming) between the Red Team and the Blue Team to identify gaps, address findings and
improve the response capability. During the test a White Team consisting of only the
smallest necessary number of the FI’s security and business experts will monitor the test
and intervene when needed, e.g. when the test seems to lead to critical impact (during a
test, business impact is allowed to a level agreed on beforehand, critical impact is not).
The White Team will be in close contact with the TIBER-NL Test Manager from DNB’s
TIBER-NL Cyber Sector Team (TCST), who convoys the TIBER-NL test process.
22
Financial Sector’s Cybersecurity: A Regulatory Digest
This guide has been developed by the TCST from the Dutch Central Bank in close
cooperation with all institutions from the Dutch FCI. It is meant to serve these TIBER-
NL participants and their cyber security service providers. It explains the key phases,
activities, deliverables and interactions involved in a TIBER-NL test.”
16. SFC Guidelines for Reducing and Mitigating Hacking Risks Associated with
Internet Trading (Oct 2017)
The Hong Kong Securities and Futures Commission (SFC), after a period of consultation,
published a Guideline for Licensed Companies setting out the baseline requirements to
reduce or mitigate hacking risks associated with internet trading.
Compliance with the Guidelines is required from 27 July 2018 (except for two-factor
authentication, to be effective in April 2018). (FSB-STi)
The Financial Stability Board (FSB), as tasked by the G20 meeting in Baden-Baden
(March 2017), published the results of a Stocktake and Summary Report on cybersecurity
regulations, guidance and supervisory practices (publicly issued) at the meeting of the
G20 Finance Ministers and Central Bank Governors in Washington DC.
“The reports are informed by the responses of [all 25] FSB member jurisdictions and
[nine] international bodies to a survey conducted by the FSB. The summary report also
sets out key themes raised in an FSB workshop in September that brought together public
and private sector participants to discuss cybersecurity in the financial sector.
FSB member jurisdictions have been active in addressing cybersecurity, with all member
jurisdictions having released regulations or guidance that address cybersecurity for the
financial sector. Findings of the FSB stocktake include:
23
Financial Sector’s Cybersecurity: A Regulatory Digest
All FSB member jurisdictions report drawing upon a small body of previously
developed national or international guidance or standards when developing their
own regulatory or supervisory schemes for the financial sector.
Two thirds of reported regulatory schemes take a targeted approach to
cybersecurity and/or information technology risk and one-third address
operational risk generally.
Some elements commonly covered by regulatory schemes targeted to
cybersecurity include risk assessment, regulatory reporting, role of the board,
third-party interconnections, system access controls, incident recovery, testing and
training.
Jurisdictions remain active in further developing their regulation and guidance.
Seventy-two per cent of jurisdictions report plans to issue new regulations,
guidance or supervisory practices that address cybersecurity for the financial
sector within the next year.
International bodies also have been active in addressing cybersecurity for the
financial sector. There are a number of similarities across the international
guidance issued by different sectoral standard-setting bodies and other
international organisations. Many of the same topics are addressed, including
governance, risk analysis and assessment, information security, expertise and
training, incident response and recovery, communications and information
sharing, and oversight of interconnections.
The FSB Stocktake document includes summaries of the FSB Cybersecurity Survey
responses, providing a concise reference for these 25 jurisdictions. This valuable
resource has enriched the current update of the Digest in its mirrored effort to collect
cybersecurity regulation and guidance for the financial sector. The documents owing
their coverage in the Digest to the FSB Cybersecurity Survey will be cited with the
notation “FSB-ST”.
Building upon prior year’s guidance of the same title (see coverage in the Digest), the
finance ministers and central bank governors of the G-7 countries (Canada, France,
Germany, Italy, Japan, the United Kingdom, and the United States) released a follow-up
guidance.
Described as “nonbinding, high-level building blocks that provide the foundation for
private and public entities, as they develop their approach to cybersecurity, supported by
their risk management and culture”, the document specifically provides:
24
Financial Sector’s Cybersecurity: A Regulatory Digest
Pursuing the objectives set out in the European Commission’s Digital Single Market
Strategy, “the proposal aims to address the following issues:
Improving the mobility of non-personal data across borders in the single market,
which is limited today in many Member States by localisation restrictions or legal
uncertainty in the market;
Ensuring that the powers of competent authorities to request and receive access to
data for regulatory control purposes, such as for inspection and audit, remain
unaffected; and
Making it easier for professional users of data storage or other processing services
to switch service providers and to port data, while not creating an excessive burden
on service providers or distorting the market.”
“This proposal focuses on provision of data hosting (storage) and other processing
services, and is coherent with existing legal instruments. The initiative pursues the
creation of an effective EU single market for such services. It is thus consistent with the
E-commerce Directive which aims at a comprehensive and effective EU single market for
the broader categories of information society services, and with the Services Directive
which furthers the deepening of the EU single market for services in a number of
sectors…”
25
Financial Sector’s Cybersecurity: A Regulatory Digest
The proposal delineates scope of mandate for ENISA in the following areas: EU policy
development and implementation; capacity building (including contributing to the
establishment of Information Sharing and Analysis Centres (ISACS) in various sectors);
knowledge and information, awareness raising; research and innovation; operational
cooperation and crisis management (including pan-European cybersecurity exercises
(Cyber Europe – see coverage in Digest) to be run on an annual basis); the EU
cybersecurity “Blueprint”; and Market related tasks (standardisation, cybersecurity
certification).
26
Financial Sector’s Cybersecurity: A Regulatory Digest
The Framework's schemes would be voluntary and would not create any immediate
regulatory obligations on vendors or service providers. The schemes would not contradict
any applicable legal requirements, such as the EU legislation on data protection.”
An EC website for the proposal includes the relevant documents including the proposal, an
annex, and related impact assessments.
21. AU - Banking Executive Accountability & Related Measures Bill (Sep 2017)
“This Bill amends the Banking Act 1959 to establish the Banking Executive Accountability
Regime (BEAR). The BEAR is a strengthened responsibility and accountability framework
for the most senior and influential directors and executives in authorized deposit-taking
institutions (ADI) groups. It requires them to conduct themselves with honesty and
integrity and to ensure the business activities for which they are responsible are carried out
effectively.” The BEAR provisions are due to apply from 1 July 2018. Consultation period
ended September 29.
The US National Institute of Standards and Technology (NIST)’s National Initiative for
Cybersecurity Education (NICE) Cybersecurity Workforce Framework aims to provide
organizations with a common vocabulary when describing the role, area of specialty,
category of work, and the knowledge, skills, and abilities (KSA) of cybersecurity
professionals.
The newly published Risk Alert reported mixed progress of the regulated entities. It noted:
The examinations focused on the firms’ written policies and procedures regarding
cybersecurity, including validating and testing that such policies and procedures were
implemented and followed. In addition, the staff sought to better understand how firms
managed their cybersecurity preparedness by focusing on the following areas: (1)
governance and risk assessment; (2) access rights and controls; (3) data loss prevention;
(4) vendor management; (5) training; and (6) incident response.
The Risk Alert announcing the OCIE Cybersecurity Initiative noted that the initiative is
designed to assess cybersecurity preparedness in the securities industry and to obtain
information about the industry’s recent experiences with certain types of cyber threats. As
27
Financial Sector’s Cybersecurity: A Regulatory Digest
part of this initiative, OCIE will conduct examinations of more than 50 registered broker-
dealers and registered investment advisers focused on the following: the entity’s
cybersecurity governance, identification and assessment of cybersecurity risks, protection
of networks and information, risks associated with remote customer access and funds
transfer requests, risks associated with vendors and other third parties, detection of
unauthorized activity, and experiences with certain cybersecurity threats.
The IMF published Working Paper - Cyber Risk, Market Failures, and Financial Stability:
“This paper considers the properties of cyber risk, discusses why the private market can
fail to provide the socially optimal level of cybersecurity, and explore how systemic cyber
risk interacts with other financial stability risks. Furthermore, this study examines the
current regulatory frameworks and supervisory approaches, and identifies information
asymmetries and other inefficiencies that hamper the detection and management of
systemic cyber risk. The paper concludes discussing policy measures that can increase the
resilience of the financial system to systemic cyber risk.”
As part of its roll out of the SWIFT Customer Security Programme (CSP) requirement
announced in September 2016, SWIFT launched the KYC Registry Security Attestation
Application (KYC-SA) – “a central application for users to self-attest their level of
compliance with SWIFT’s Customer Security Controls Framework. The KYC-SA
application also enables users to securely exchange their security status information with
selected counterparties, supporting cyber risk management, transparency and business due
diligence.”
In April and May, SWIFT issued its new mandatory Customer Security Controls
Framework and published further details of the related attestation policy and process as
announced in September 2016 in the SWIFT Customer Security Controls Policy document.
SWIFT’s Customer Security Controls Framework is presented via three objectives (Secure
your Environment, Know and Limit Access, and Detect and Respond), eight principles
within those objectives, and 27 (16 mandatory and 11 advisory) controls organized under
those principles. These controls are intended to help customers to safeguard their local
environments and reinforce the security of the global financial community.
28
Financial Sector’s Cybersecurity: A Regulatory Digest
Also in May, it launched the SWIFT Information Sharing and Analysis Centre, SWIFT
ISAC, global portal, a key part of its Customer Security Program to facilitate information
sharing among its community. “...existing intelligence bulletins will now be stored in the
SWIFT ISAC portal, in a readily readable and searchable format, aligned with standardised
templates... This information includes malware details such as file hashes and YARA rules,
Indicators of Compromise, as well as details on the Modus Operandi used by the cyber-
criminals. The information, which is particularly relevant to SWIFT customers, can also
be downloaded as PDF reports or as machine-readable files in OpenIOC format, an XML-
based file format that is commonly used by the cyber-security industry.”
There had been multiple incidents involving fraudulent transfers through the SWIFT
messaging system, although incidents stemmed from breaches within locally managed
infrastructure at the customer level and not that of SWIFT’s own network or software.
“The Senior Managers and Certification Regime (SM&CR) currently applies to deposit
takers and, following the Bank of England and Financial Services Act 2016, is now being
extended to FCA solo-regulated firms. It replaces the current Approved Persons Regime,
changing how individuals working in financial services are regulated... This consultation
paper sets out our proposed approach to the extension of the SM&CR as well as some
minor proposals relating to the existing banking regime.”
28. ENISA Cyber Europe 2016: After Action Report (Jun 2017)
European Union Agency for Network and Information Security (ENISA) published
“Cyber Europe 2016: After Action Report – Findings from a cyber crisis exercise in
Europe”. Cyber Europe 2016 was the fourth pan-European cyber crisis exercise organised
by ENISA. Over 1,000 participants working mostly in the ICT sector, from public and
private organisations from all 28 Member States of the European Union and two from the
European Free Trade Association (EFTA), joined in a programme of activities ranging
from training sessions and communication checks to technical competitions and
cooperation exercises.
29
Financial Sector’s Cybersecurity: A Regulatory Digest
Cyber Europe was launched in 2010 by ENISA, as a bi-annual exercise. The 5th iteration
“CE2018” will be focused on a scenario revolving around the Aviation industry. The 4th
in 2016 revolved around IT, telecommunications and cybersecurity industries, while the
prior exercises were not industry specific.
The Association of Banks in Singapore (ABS) published the version 1.1 of its “Guidelines
on control objectives and procedures for outsourced service providers” based on the MAS
Guidelines on Outsourcing (issued on 27 July 2016) and industry feedback. In July 2015,
it had first issued the earlier version 1.0 of the Issuance of initial Guidelines on control
objectives and procedures for outsourced service providers”
“…the Association of Banks in Singapore (“ABS”) has established these Guidelines on
Control Objectives and Procedures for the FIs’ Outsourced Service Providers (“OSPs”)
operating in Singapore. These Guidelines form the minimum/baseline controls that OSPs
which wish to service the FIs should have in place. However, FIs with specific needs
should continue to liaise with their OSPs on a bilateral basis to impose any additional
specific requirements...
By complying with the Guidelines, OSPs can assure the FIs that their controls are designed
and operating effectively to meet the control objectives that are relevant in the provision
of the outsourced services.
SCOPE: These Guidelines should be adopted by all OSPs in Singapore that undertake
material outsourcing arrangements for FIs in Singapore.”
The Cyber-security Law (unofficial English version) of the People’s Republic of China
(PRC) took effect on 1 June 2017 (published November 2016 (Official Chinese version)).
The law applies to everyone who operates networks in the PRC and will affect
multinational corporations. The Cyberspace Administration of China (CAC) has issued a
series of regulations implementing the law. The public has been asked for comments on
other proposed implementing rules, including measures affecting the transfer of personal
data outside the PRC.
30
Financial Sector’s Cybersecurity: A Regulatory Digest
The Framework will be used to periodically assess the maturity level and evaluate the
effectiveness of the cyber security controls at Member Organizations, and to compare
these with other Member Organizations. The Framework is based on the SAMA
requirements and industry cyber security standards, such as NIST, ISF, ISO, BASEL and
PCI.
The Framework supersedes all previous issued SAMA circulars with regard to cyber
security." (FSB-STi)
On top of highlighting the importance of developing “common and shared practices to help
timely detection of vulnerabilities in the financial system” they raised the need for current
assessment approaches to be “enhanced and be complemented by practices that are tailored
to bolster cyber resilience, including regular cyber exercises and simulations as well as
consideration of how to most effectively leverage penetration tests” in response to rapidly
evolving nature of cyber risks.
Most importantly, the G7 Cyber Expert Group (G7 CEG) was mandated to develop a set
of high level and non-binding fundamental elements for effective assessment of
cybersecurity by October 2017.
They also specified the following areas for future further work:
31
Financial Sector’s Cybersecurity: A Regulatory Digest
“...task the G7 CEG to advance work on the third-party risks and the coordination with
other critical sectors....
...encourage international coordination and knowledge sharing.
...explore other issues of interest related with cybersecurity as directed and prioritised by
G7 Finance Ministers and Central Banks Governors.
...call on the International Organizations and governmental institutions in partnership with
the private sector to enhance sharing of cybersecurity information. Definitions, collection
methodologies and data sharing, when appropriate, should be coordinated and consistent
across countries and sectors, so that results are comparable. Sharing national experiences
and best practices among all stakeholders on optimal cybersecurity legislation or relevant
regulatory initiatives would be highly beneficial.”
The communique also informed that the G7 is following the development of a cyber
insurance market and the ongoing work by OECD, notably its report Supporting an
Effective Cyber Insurance Market.
The EBA finalized its Guidelines on ICT Risk Assessment under the Supervisory Review
and Evaluation process (SREP).
The EBA launched a consultation on its draft Guidelines on the assessment of information
and communication technology (ICT) risk in the context of the supervisory review and
evaluation process (SREP). These draft Guidelines are addressed to competent authorities
and aim at promoting common procedures and methodologies for the assessment of ICT
risk.
• ICT governance (risks at senior management level and management body level);
• ICT strategy and its alignment with an institution’s business strategy; and
• ICT risk exposures and controls.
These Guidelines build on existing references to ICT risk in the EBA SREP guidelines
providing the scope and methodology for the assessment of ICT risk within an institution
and are structured around three main parts:
The assessment contained in these guidelines feeds into the EBA SREP methodology more
generally, therefore, they should be read along with the EBA SREP Guidelines, which
32
Financial Sector’s Cybersecurity: A Regulatory Digest
continue to remain applicable as appropriate. The appendix lists and provides examples of
the different type of ICT risks.
From its Overview: “The content of the Assessment is consistent with the principles of the
FFIEC Information Technology Examination Handbook (IT Handbook) and the National
Institute of Standards and Technology (NIST) Cybersecurity Framework, as well as
industry accepted cybersecurity practices. The Assessment provides institutions with a
repeatable and measurable process to inform management of their institution’s risks and
cybersecurity preparedness.”
The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity.
The Inherent Risk Profile identifies the institution’s inherent risk before implementing
controls. The Cybersecurity Maturity includes domains, assessment factors, components,
and individual declarative statements across five maturity levels to identify specific
controls and practices that are in place. While management can determine the institution’s
maturity level in each domain, the Assessment is not designed to identify an overall
cybersecurity maturity level.
To complete the Assessment, management first assesses the institution’s inherent risk
profile based on five categories:
33
Financial Sector’s Cybersecurity: A Regulatory Digest
Management then evaluates the institution’s Cybersecurity Maturity level for each of five
domains:
FFIEC consists of the principals of the following: The Board of Governors of the Federal
Reserve System, Federal Deposit Insurance Corporation, National Credit Union
Administration, Office of the Comptroller of the Currency, Consumer Financial Protection
Bureau, and State Liaison Committee.
36. Report of India's Working Group for Setting up of a financial sector CERT (May
2017)
A working group, chaired by Indian computer emergency response team (CERT-In), set
up for the formulation of a CERT in the financial sector (CERT-Fin), released a report
with recommendations to India's Financial Stability & Development Council, chaired by
the Minister of Finance. (FSB-STi)
South African Reserve Bank (SARB) issued a Guidance Note on the applicability of the
CPMI-IOSCO Guidance on cyber resilience for FMIs to banks, controlling companies
and branches of foreign institutions. It specified that "This office will in future, as part of
its supervisory review and evaluation process, assess the adequacy of banks' policies,
processes and practices related to cyber risk and cyber resilience, based on, among other
things, the practices contained in the aforementioned CPMI-IOSCO guidance document...
As such, banks are requested to assess the adequacy and robustness of their current
policies, processes and practices against the CPMI-IOSCO cyber resilience guidance
principles." (FSB-STi)
38. Australia’s Cyber Security Strategy First Annual Update (Apr 2017)
First Annual Update for Australia’s four-year Cyber Security Strategy, published in April
2016 to cover up to 2020, reports on the status of “the Government’s promise of improving
the security of Australia’s online environment, and enabling innovation, growth and
prosperity.” It reports ‘strong progress’ against the 33 initiatives set out in 2016, and
highlights the “momentum and established a platform for more direct, deeper and richer
conversations between governments, business and the public.” (FSB-STi)
39. ASX 100 Cyber Health Check Survey Report (Apr 2017)
The Australian Securities Exchange (ASX) 100 Cyber Health Check, a voluntary survey
of the top100 listed companies in Australia (76 responded between November 2016 and
34
Financial Sector’s Cybersecurity: A Regulatory Digest
January 2017), is “the first attempt to gauge how the boards of Australia’s largest listed
companies view and manage their exposure to cyber risk. It is an industry-led initiative
that forms part of the Australian Government’s Cyber Security Strategy…
The report demonstrates a high level of risk awareness at the top levels of corporate
Australia and a commitment to take further action. The report also provides a framework
for all Australian businesses to better evaluate their own effectiveness in addressing cyber
risk and identifying opportunities to improve their cyber resilience.” (FSB-STi)
40. IRDAI Guidelines on Information and Cyber Security for insurers (Apr 2017)
Insurance Regulatory and Development Authority of India (IRDAI) issued a Circular with
a detailed control check list for the effective implementation of these guidelines.
With various timelines until end of March 2018, the IRDAI requires the following: 1)
Appointment/ designation a suitably qualified and experienced Senior Level Officer
exclusively as Chief Information Security Officer (CISO) who will be responsible for
articulating and enforcing the policies to protect their information assets and formation of
Information Security Committee (ISC); 2) Preparation of Gap Analysis report; 3)
Formulation of Cyber Crisis Management Plan; 4) Finalization of Board approved
Information and Cyber Security Policy; 5) Formulation of Information and Cyber
Security assurance programme (implementation plan / guidelines) in line with Board
approved Information and Cyber security policy; and 6) Completion of first
comprehensive Information and Cyber Security assurance audit. (FSB-STi)
41. ESAs Report on main risks for the EU Financial System (Apr 2017)
The Joint Committee of the European Supervisory Authorities (ESAs: EBA, EIOPA, and
ESMA) published its spring 2017 Report on risks and vulnerabilities in the European
Union’s financial system.
The report focuses on continued challenges highlighted in the August 2016 report, but also
highlights increasing challenges posed by rapid advances in information and
communication technologies (ICT), including cyber-risks.
The Report highlights among others the rising operational risks related to information and
communication technologies that are increasingly requiring supervisory attention.
The ESAs are responding to cyber-and IT-related risks by, e.g., drafting Guidelines on ICT
risk assessment for supervisors, assessing cyber-security capabilities of central
counterparties (CCPs) and assessing the potential accumulation of risk at insurers deriving
from newly developed cyber-security coverages.
The American Institute of Certified Public Accountants (AICPA) finalized the guidance
for Systems and Organization Controls (SOC) for Cybersecurity.
35
Financial Sector’s Cybersecurity: A Regulatory Digest
(AICPA) has developed a cybersecurity risk management reporting framework. Using it,
organizations can communicate pertinent information regarding their cybersecurity risk-
management efforts and educate stakeholders about the systems, processes and controls
they have in place to detect, prevent and respond to breaches. The reporting framework
also enables a CPA to examine and report on the management-prepared cybersecurity
information, thereby increasing the confidence that stakeholders may place on an
organization’s initiatives. other words, this provides clear guidance for CPAs to provide
assurance on cybersecurity.”
“The AICPA determined that the entity reporting framework should be developed first....
The AICPA is in the process of revising the SOC 2 R guide for service organizations. Once
that project has been completed, the AICPA will develop a new supply-chain/vendor-risk
management guide to address the supply-chain level.”
China released its first strategy on cyberspace cooperation regarding the virtual domain.
The International Strategy of Cooperation on Cyberspace (unofficial English version)
provides a comprehensive explanation of China's policy and position on cyber-related
international affairs as well as the basic principles, strategic goals and plan of action in its
external relations. It aims to guide China's participation in international exchange and
cooperation in cyberspace, and encourage the international community to come together
to enhance dialogue and cooperation and build a peaceful, secure, open, cooperative and
orderly cyberspace and a multilateral, democratic and transparent global Internet
governance system. (FSB-STi)
The new Requirements on cyber-security from the New York Department of Financial
Services (NY DFS) took effect on 1 March 2017.
The regulation requires banks, insurance companies, and other financial services
institutions regulated by the NYDFS to establish and maintain a cyber-security program
designed to protect customer information as well as the information technology systems of
these regulated entities. The proposed requirements for regulated financial institutions
include, among others:
36
Financial Sector’s Cybersecurity: A Regulatory Digest
This regulation requires each company to assess its specific risk profile and design a
program that addresses its risks in a robust fashion. Senior management must take this issue
seriously and be responsible for the organization’s cybersecurity program and file an
annual certification confirming compliance with these regulations. A regulated entity’s
cybersecurity program must ensure the safety and soundness of the institution and protect
its customers.
The EU Commission (EC) launched a Consultation on technology and its impact on the
European financial services sector as part of its consumer financial services action plan.
The consultation is structured along four policy objectives:
The last of the four areas notes: “... important questions about personal data processing,
data management policies, data standardization, data sharing, security and ability to access
and supervise data from (licensed) providers of financial services should move to the
forefront of the policy agenda for FinTech. Mismanagement in these important areas can
cause loss of trust and disruption in the market that would require policy intervention.”
The consultation aims to gather information on the impact of innovative technology on the
financial sector to aid the EC in developing its policy approach and to help assess whether
the regulatory and supervisory framework promotes technological innovation.
46. BaFin Consultation on bank regulatory requirements for IT systems (Mar 2017)
The German Federal Financial Supervisory Authority (BaFin) published (in German
language) a Draft Circular “Banking Supervision Requirements for IT” (BAIT).
The draft specifies BaFin’s minimum requirements for risk management (MaRisk) with
respect to the security of information technology. It highlights the IT security requirements
imposed by BaFin and the Bundesbank on institutions.
Furthermore, the circular helps increase institutions’ awareness of IT risks, including the
risks from third-party providers.
37
Financial Sector’s Cybersecurity: A Regulatory Digest
(FSB-STi)
In early 2016, the Open Banking Working Group (OBWG) established by the UK Treasury,
published a manual, the Open Banking Standard, setting out a detailed framework of how
Open Banking Standard could be designed and delivered, with a time table for achieving
this. The Open Banking Initiative website explains that its “delivery is split between March
2017 and January 2018, with March 2017 being focused on Open Data, making available
information on ATMs, Branches, Personal Current Accounts, Business Current Accounts
(for SMEs) & SME Unsecured Lending and Commercial Credit Cards. January 2018 is
aligned to the upcoming European Regulation (Payment Services Directive 2), where
authorized third parties can be given consent by the account holder to access their Bank
accounts to extract statement information and to initiate payments, without having to use
the Banks Online services. It is envisaged that this capability will then lead to far reaching
innovative services being created by new entrants and technology companies.”
The OBWG includes nine Banks mandated by the CMA (Allied Irish Bank, Bank of
Ireland, Barclays, Danske, HSBC, Lloyds Banking Group, Nationwide, RBS Group,
Santander), as well as Challenger Banks, Fintechs, Third Parties, Consumer Groups and
other parties to define and develop the required Application Programmer Interfaces (APIs),
security and messaging standards that underpin Open Banking.
The BIS Committee on Payments and Market Infrastructures (CPMI) published a Report
on distributed ledger technology (DLT) in payment clearing and settlement. Distributed
ledgers, also known as blockchains, are ledgers of electronic transactions maintained by a
shared network of participants and not by a centralised entity.
The report provides an analytical framework for central banks and other authorities to
review and analyse the use of this technology for payment, clearing, and settlement. The
objective of the framework is to help understand the uses of DLT and, in doing so, identify
both the opportunities and challenges associated with this technology.
The framework presents the technology’s potential to provide operational efficiencies and
to make financial markets more robust and resilient. Enhanced operational resilience and
reliability are of particular interest to the authorities given the importance of protecting
against cyberthreats. It also contains a set of questions that should be useful when looking
at DLT arrangements.
It highlights that work is still needed to ensure that the legal underpinnings of DLT
arrangements are sound, governance structures are robust, technology solutions meet
38
Financial Sector’s Cybersecurity: A Regulatory Digest
industry needs, and that appropriate data controls are in place and satisfy regulatory
requirements.
The US National Institute of Standards and Technology (NIST) issued in January 2017 a
draft update to the Framework for Improving Critical Infrastructure Cybersecurity—also
known as the Cybersecurity Framework. Providing new details on managing cyber-supply
chain risks, clarifying key terms, and introducing measurement methods for cyber-security.
The updated framework aims to further develop NIST’s voluntary guidance to
organizations on reducing cybersecurity risks.
The 2017 draft, Version 1.1 incorporates feedback since the release of framework version
1.0, and integrates comments from the December 2015 Request for Information as well as
comments from attendees at the Cyber-security Framework Workshop 2016.
50. Turkey National Cyber Security Strategy and Action Plan (2016, 2013)
Turkey published its National Cyber Security Strategy for the period 2016-2019 in 2016.
Two main objectives of the strategy are to strengthen the understanding of cyber security’s
role as an integral part of national security for all stakeholders, and to acquire the
competency that will allow taking administrative and technological precautions for
maintaining the absolute security of all systems and stakeholders in national cyber space.
Targets and sub actions are determined in the strategy, while ensuring and supervising
their implementation. This is an updated version of the National Cyber Security Strategy
and Action Plan for 2013-14, published in 2013. The strategy for 2013-2014 defines
cybersecurity risks and principles for maintenance of cybersecurity to be updated in a
coordinated way at the national level, taking into account the requests from the public and
private sector, and considering also the developing technology, changing conditions and
needs. (FSB-STi)
Building on the achievements, objectives and judgements of the first five-year National
Cyber Security Strategy issued in 2011, the UK government issued a new National Cyber
Security Strategy document, with the following goals:
"DEFEND: We have the means to defend the UK against evolving cyber threats, to
respond effectively to incidents, to ensure UK networks, data and systems are protected
39
Financial Sector’s Cybersecurity: A Regulatory Digest
and resilient. Citizens, businesses and the public sector have the knowledge and ability to
defend themselves.
DETER: The UK will be a hard target for all forms of aggression in cyberspace. We detect,
understand, investigate and disrupt hostile action taken against us, pursuing and
prosecuting offenders. We have the means to take offensive action in cyberspace, should
we choose to do so.
The Bank of England’s Sector Cyber-Team (SCT) published version 2.0 of its CBEST
“framework for intelligence-led penetration testing of systemically critical organizations”
for the CBEST engagement participants and service providers.
The CBEST framework was first launched in June 2014 by UK Financial Authorities,
headed by the Bank of England at the recommendation of the Financial Policy Committee
(FPC), which is “charged with taking action to remove or reduce systemic risks with a view
to protecting and enhancing the resilience of the UK financial system.”
CBEST tests are “built around the key potential attackers for a particular firm and the attack
types they would deploy,” making use of up-to-date threat intelligence direct from UK
Government agencies and accredited commercial providers.
CBEST program has also brought forth new accreditation standards for threat intelligence
providers and penetration testing providers, working with the Council for Registered
Ethical Security Testers (CREST).
40
Financial Sector’s Cybersecurity: A Regulatory Digest
1. Implementation Guide, which explains the key phases, activities, deliverables and
interactions involved in a CBEST assessment;
53. The National Cyberspace Security Strategy of the People’s Republic of China
(Dec 2016)
The National Cyberspace Security Strategy (unofficial English version) of the People’s
Republic of China is formulated to elaborate China’s major standpoints concerning
cyberspace development and security, guide China’s cybersecurity work and safeguard
the country’s interests in the sovereignty, security and development of cyberspace. The
objective of the strategy is to promote peace, security, openness, cooperation and order in
cyberspace.
Details of nine strategic tasks are also included in the strategy. (FSB-STi)
“The review shows that there is a strong justification for regulation to secure personal data,
as there is a clear public interest in protecting citizens from crime and other harm...
41
Financial Sector’s Cybersecurity: A Regulatory Digest
Government will therefore seek to improve cyber-risk management in the wider economy
through its implementation of the forthcoming General Data Protection Regulation
(GDPR). The breach reporting requirements and fines that can be issued under GDPR will
represent a significant call to action. These will be supplemented by a number of measures
to more clearly link data protection with cyber-security, including through closer working
between the Information Commissioner’s Office and the new National Cyber-Security
Centre.”
Hong Kong Monetary Authority (HKMA) and the banking industry released a Guide to
Enhanced Competency Framework (ECF) on Cybersecurity for the banking sector. "This
framework enables cybersecurity talent development and facilitates the building of
professional competencies and capabilities of those staff engaged in cybersecurity duties."
The Guide aims to provide details of the scope of application, qualification structure,
recognised certificates and continuing professional development requirements to equip
relevant staff with the right skills, knowledge and behaviour.... The HKMA will assess
the progress of implementation of the ECF on Cybersecurity by [authorized institutions]
and [their] effort in enhancing staff competence in this area during its on-going
supervisory process. (FSB-STi)
The Hong Kong Securities and Futures Commission (SFC) issued a Circular on enhancing
the accountability regime for senior management of licensed companies. The circular
specifies definition of senior management and their regulatory obligations and potential
legal liabilities. It specifies eight core functions of a licensed company for which it must
appoint at least one fit and proper person to be the managerin charge (MIC), and provides
guidance on selection of the MIC(s). It also brings in the roles and responsibilities of the
Board of Directors.
The Hong Kong Monetary Authority (HKMA) issued in December 2016 a Circular to
authorized institutions to inform them of the implementation details of the Cybersecurity
Fortification Initiative (CFI). The CFI consists of three pillars:
The C-RAF is a tool to help authorized institutions evaluate their cyber resilience.
The assessment comprises three stages:
42
Financial Sector’s Cybersecurity: A Regulatory Digest
The HKMA will adopt a phased approach to the implementation of the C-RAF as
follows:
– the first phase will cover around 30 authorized institutions including all major
retail banks, selected global banks and a few smaller authorized institutions –
the HKMA will inform these authorized institutions individually;
– the expected timeline for completing the C-RAF assessment under the first
phase is end-September 2017 for inherent risk assessment and maturity
assessment, and end-June 2018 for iCAST (if applicable); and
– depending on industry feedback and the experience gathered from the first
phase, the second phase will cover all the remaining authorized institutions.
They will be expected to complete the inherent risk assessment and the maturity
assessment by the end of 2018. The HKMA will consider the assessment results
of the second phase in determining a timeframe for the remaining authorized
institutions to complete the iCAST. Although authorized institutions covered
in the second phase are given a longer timeframe for implementation, they
should familiarize themselves with the C-RAF and take steps to strengthen their
cyber-resilience at an early stage where necessary.
The PDP, rolled out in December 2016, seeks to provide a local certification scheme
and training program for cybersecurity professionals. At the request of the industry,
the HKMA has adopted a list of professional qualifications, recommended by an
expert panel, which are equivalent to the certification provided under the PDP. A
person holding a PDP certification or an equivalent professional qualification may
perform the assessments and tests in relation to the different roles defined under the
C-RAF as set out in the Annex of the circular.
The HKMA noted that all banks are expected to join the Cyber Intelligence Sharing
Platform. Banks were advised to start to make the necessary preparations including
system changes at an early stage.
The CISP is ready for access by banks with effect from December 2016.
43
Financial Sector’s Cybersecurity: A Regulatory Digest
The G7 published its fundamental elements of cybersecurity for the financial sector to
“serve as the building blocks upon which an entity can design and implement its
cybersecurity strategy and operating framework, informed by its approach to risk
management and culture. The elements also provide steps in a dynamic process through
which the entity can systematically re-evaluate its cyber-security strategy and framework
as the operational and threat environment evolves. Public authorities within and across
jurisdictions can use the elements as well to guide their public policy, regulatory, and
supervisory efforts.”
5. Response: Timely (a) assess the nature, scope, and impact of a cyber incident; (b)
contain the incident and mitigate its impact; (c) notify internal and external
stakeholders (such as law enforcement, regulators, and other public authorities, as
well as shareholders, third-party service providers, and customers as appropriate);
and (d) coordinate joint response activities as needed;
44
Financial Sector’s Cybersecurity: A Regulatory Digest
On 19 October 2016, the Board of Governors of the Federal Reserve System, the Federal
Deposit Insurance Corporation, and the Office of the Comptroller of the Currency (the
Federal Banking Agencies) issued an Advanced Notice of Proposed Rulemaking to
establish enhanced cyber-security standards.
The proposed rules would apply to large institutions subject to the agencies’ jurisdiction,
including:
45
Financial Sector’s Cybersecurity: A Regulatory Digest
• nonbank financial companies supervised by the Federal Reserve per the DoddFrank
Act. (section 165).
While the ANPR is based on some existing regulatory guidance, it also adds some new and
more stringent requirements to covered entities. For example, it requires a very short two-
hour timeframe to recover critical systems from cyber-events. Improvements are proposed
in the following areas:
61. SFC Review of cybersecurity of online & mobile trading systems (Oct 2016)
The Hong Kong Securities and Futures Commission (SFC) launched a Review of cyber-
security, compliance and resilience of brokers’ internet/mobile trading systems. This
initiative follows several reports from securities brokers that the security of some
customers’ online and mobile trading accounts has been compromised and unauthorized
securities trading transactions have been conducted through these accounts.
Examples of good practices observed in the market place include (i) implementing client
data encryption; (ii) putting in place controls to detect internet protocol (IP) ranges used by
clients and abnormal buy/sell transactions; (iii) implementing two factor authentications in
conjunction with strong password requirements for client’s logon; and (iv) sending timely
trade confirmation to clients via SMS. A combination of these measures enables brokers
spot suspicious activities and mitigate against hacking risks. Where the security of accounts
is compromised, early detection enables brokers to send alert to clients to stop further
unauthorized trading.
46
Financial Sector’s Cybersecurity: A Regulatory Digest
The Guidelines, among other requirements, clearly stipulate the roles and responsibilities
of the board and senior management in building cyber-resilience of a capital market entity.
The entity is required to identify a responsible person to be accountable for the effective
management of cyber-risk. The involvement of the board and senior management is
deemed important to ensure that the capital market entity puts adequate focus on cyber-risk
issues, determines risk tolerance and priorities, and allocates sufficient resources to cyber-
risk.
The Guidelines require regulated entities to have in place a risk management framework to
minimize cyber-threats, implement adequate measures to identify potential vulnerabilities
in their operating environment and ensure timely response and recovery in the event of a
cyber-breach.
These Guidelines are to be implemented in phases for entities based on, among others, size,
nature of activities, and market share.
63. APRA Information Paper: 2015/16 Cyber Security Survey Results (Sep 2016)
47
Financial Sector’s Cybersecurity: A Regulatory Digest
significant service providers, covering all APRA-regulated industries, with the exception
of private health insurance…
The survey results, in conjunction with other supervisory information, confirm that APRA
regulated entities, not only the largest of these entities, need to operate on the assumption
that cyber attacks will occur and that such attacks will remain a constant challenge...”
(FSB-STi)
The Canadian Securities Administrators (CSA – covering FMIs, trading venues, asset
managers, broker-dealers, and reporting issuers) issued a Staff Notice 11-332: Cyber
Security, updating a previous Staff Notice: “Since the 2013 Notice, the cyber security
landscape has evolved considerably, as cyber attacks have become more frequent,
complex and costly for organizations. Accordingly, the CSA is publishing this Notice on
cyber security in order to:
The Central Bank of Ireland issued in September 2016 a Guidance on IT and cybersecurity
governance and risk management for financial services firms.
The document sets out the Central Bank’s observations from supervisory work in this area
and outlines guidance reflecting “the current thinking as to good practices that regulated
firms should use to inform the development of effective IT and cybersecurity governance
and risk management frameworks.”
Boards and Senior Management of regulated firms are expected to fully recognize their
responsibilities for these issues and to put them among their top priorities. The guidance
lists Central Bank expectations on key issues such as alignment of IT and business strategy,
outsourcing risk, change management, cyber-security, incident response, disaster recovery
and business continuity.
48
Financial Sector’s Cybersecurity: A Regulatory Digest
The Reserve Bank of India produced final Directions providing a framework for the
registration and operation of “Account Aggregators” in India, requiring these operators to
register and be regulated by the RBI. It defines “Account Aggregators” as non-banking
financial companies that will collect and provide information on a customer’s financial
assets, in a consolidated, organized and retrievable manner to the customer or any other
person as per the instructions of the customer. The Directions prohibit Account
Aggregators from conducting any other business than that of aggregator, handling
transactions for customers, for example. It clearly sets out Data Security requirements,
including prohibiting request or storing of customer credentials.
67. ENISA Strategies for Incident Response & Cyber Crisis Coop. (Aug 2016)
This document from the European Union Agency for Network and Information Security
(ENISA) is an input for the Network and Information Security (NIS) Platform for the
discussion on incident response and cyber crisis coordination (by “WG2” – see below). It
briefly introduces what incident response is, who the main actors are, what baseline
capabilities these entities should possess in order to effectively combat cyberattacks, and
what challenges there may be that impede efficiency in incident response. The notion of
Computer Security Incident Response Teams (CSIRTs) as key players in incident response
is introduced. Descriptions of incident response mechanisms will be elaborated, taking into
account national-level cybersecurity strategies, cyber crisis coordination and management
covering both escalation and communication between CSIRTs and government bodies.
As part of the implementation of the cybersecurity Strategy of the EU, the NIS Platform
was created in 2013 to help European stakeholders carry out appropriate risk management,
establish good cybersecurity policies and processes and further adopt standards and
solutions that will improve the ability to create safer market conditions for the EU.
The expert work of the components of the NIS Platform was divided into Working Groups
(WGs), all dealing with their special field of expertise in cybersecurity:
Ongoing work by the WGs is a series of chapters to be adopted by the NIS Platform. The
chapters foreseen by the three WGs are:
49
Financial Sector’s Cybersecurity: A Regulatory Digest
The Monetary Authority of Singapore (MAS) states “[t]hese Guidelines provide guidance
on sound practices on risk management of outsourcing arrangements... An institution
should ensure that outsourced services (whether provided by a service provider or its sub-
contractor) continue to be managed as if the services were still managed by the
institution.”
After describing an institution’s expected engagement with MAS on outsourcing,
including notification to MAS of adverse developments, the Guideline goes through the
following areas of risk management practices which institutions are obliged to implement:
Responsibility of the Board and Senior Management; Evaluation of Risks; Assessment of
Service Providers; Outsourcing Agreement; Confidentiality and Security; Business
Continuity Management; Monitoring and Control of Outsourcing Arrangements; Audit
and Inspection; Outsourcing Outside Singapore; Outsourcing with a Group; and
Outsourcing of Internal Audit to External Auditors.
The Guideline ends with a separate section on Cloud Computing/Service (CS), that “MAS
considers CS operated by service providers as a form of outsourcing… The types of risks
in CS that confront institutions are not distinct from that of other forms of outsourcing
arrangements. Institutions should perform the necessary due diligence and apply sound
governance and risk management practices articulated in this set of guidelines when
subscribing to CS….”
Its Annexes include a list of non-exhaustive examples of outsourcing arrangements to
which the guidelines apply and don’t apply, a guidance in assessing the materiality of an
outsourcing arrangement, and a template for a register of outsource entities of an
institution to be maintained for submission to MAS, at least annually or upon request.
The Guideline’s audit and inspection section specifies that “An institution’s outsourcing
arrangements should not interfere with the ability of the institution to effectively manage
its business activities or impede MAS in carrying out its supervisory functions and
objectives.” This specifically includes, not only that the outsourcing agreements should
include clauses that “allow the institution to conduct audits on the service provider and
its subcontractors, whether by its internal or external auditors, or by agents appointed by
the institution; and to obtain copies of any report and finding made on the service provider
and its sub-contractors,”, but that which also “allow MAS, or any agent appointed by
MAS, where necessary or expedient, to exercise the contractual rights of the institution
to: (i) access and inspect the service provider and its sub-contractors, and obtain records
and documents, of transactions, and information of the institution given to, stored at or
processed by the service provider and its sub-contractors; and (ii) access any report and
finding made on the service provider and its sub-contractors, whether produced by the
service provider’s and its sub-contractors’ internal or external auditors, or by agents
appointed by the service provider and its sub-contractors, in relation to the outsourcing
arrangement.”
50
Financial Sector’s Cybersecurity: A Regulatory Digest
This EU Directive on security of network and information systems sets out security
obligations for operators of essential services, including those in the banking and financial
sectors, and for digital service providers, such as online marketplaces, search engines and
cloud services.
Member States will be required to designate a national authority for dealing with cyber-
threats and to develop a national cyber-strategy among others.
I. General Provisions: “... describes the goals of the Directive, and its legislative
environment. It also gives formal definitions to terms that appear in the text.”
II. National Frameworks on the security of Network and Information Systems: “... lists
the different entities and legislative frameworks that each Member State will have to set
up in order to comply with the Directive. Each MS needs to adopt a national NIS strategy;
designate one or more national competent authorities, as well as a single point of contact
for cross-border cooperation; and set up at least one Computer Security Incident Response
Team (CSIRT). These teams need to cover certain sectors and services.”
III. Cooperation: “... defines two groups meant to improve NIS-related cooperation
between MS. The first is the Cooperation Network, composed of representatives of MS,
the Commission, and ENISA. This group is meant to focus on strategic issues. The second
group is the CSIRT Network, composed of representatives of MS’ CSIRT and CERT-EU,
with the Commission as observer and ENISA as Secretary and active support.”
IV. Security of the Network and Information Systems of Operators of Essential Ser-
vices: “... defines security requirements for and duties of operators of essential services.
These services are described in Annex 2 of the Directive.”
V. Security of the Network and Information Systems of Digital Service Providers: “...
defines security requirements for and duties of digital service providers. These providers
are described in Annex 3 of the Directive”
VII. Final Provisions: “... covers all other aspects, like the details the timeline for
transposition of the Directive, or penalties”
The Directive entered into force on 8 August 2016 and needs to be transposed by 9 May
2018.
51
Financial Sector’s Cybersecurity: A Regulatory Digest
Developed after an annual retreat of heads of public sector banks and officials of RBI, the
checklist was completed by a IDRBT group with members from banks, industry and
academia, to "help banks in identifying any gaps in cybersecurity systems", "help board
level subcommittees on risk management and information security on monitoring the
cyber defence preparedness of banks", and "likely to help banks preparing the cyber
security framework as required by the RBI Circular dated 2 Jun 2016."
71. RBI Circular to Establish Cyber Security Framework in Banks (Jun 2016)
The Reserve Bank of India (RBI) published a Circular outlining an urgent need to put in
place a robust cyber security/resilience framework at banks and to ensure adequate cyber-
security preparedness among banks on a continuous basis.
In it, RBI requires "Banks should immediately put in place a cyber-security policy
elucidating the strategy containing an appropriate approach to combat cyber threats given
the level of complexity of business and acceptable levels of risk, duly approved by their
board" to be confirmed in three months' time to RBI's Cyber Security and Information
Technology Examination (CSITE) Cell of Department of Banking Supervision.
Further, it states that Cyber Security Policy should be distinct and separate from the
broader IT policy / IS Security policy of a bank.
It mandates that a SOC (Security Operations Centre) be set up at the earliest, if not done
already, so it "ensures continuous surveillance and keeps itself regularly updated on the
latest nature of emerging cyber threats." An indicative configuration of a SOC "to monitor
and manage cyber risks in real time" is given in Annex 2.
It requires that the IT architecture be reviewed by the IT Sub Committee of the Board and
upgraded as necessary, and provides an indicative "minimum baseline cyber security and
resilience framework to be implemented by the banks" in Annex 1.
"A Cyber Crisis Management Plan (CCMP) should be immediately evolved and should
be a part of the overall Board approved strategy. Considering the fact that cyber-risk is
different from many other risks, the traditional BCP/DR arrangements may not be
adequate and hence needs to be revisited keeping in view the nuances of the cyber-risk...
CCMP should address the following four aspects: (i) Detection (ii) Response (iii)
Recovery and (iv) Containment."
"It is reiterated that banks need to report all unusual cybersecurity incidents (whether they
were successful or were attempts which did not fructify) to the Reserve Bank. Banks are
52
Financial Sector’s Cybersecurity: A Regulatory Digest
also encouraged to actively participate in the activities of their CISOs’ Forum coordinated
by IDRBT and promptly report the incidents to Indian Banks – Center for Analysis of
Risks and Threats (IB-CART) set up by IDRBT.
It provides a cyber-incident reporting template (Annex 3) and announces that "it has been
decided to collect both summary level information as well as details on information
security incidents including cyber-incidents. Banks are required to report promptly the
incidents".
Banks are required to take suitable steps in building awareness about the potential impact
of cyber-attacks among customers, employees, partners and vendors, and also to urgently
bring the Board of Directors and Top Management in banks up to speed on cyber-security
related aspects. (FSB-STi)
The Committee on Payments and Market Infrastructures (CPMI) and the International
Organization of Securities Commissions (IOSCO) have published a Guidance on cyber-
security which highlights the following points:
73. HKMA Circular Security controls related to Internet banking services (May
2016)
53
Financial Sector’s Cybersecurity: A Regulatory Digest
The report results from a board-level coordination effort led by the Quebec AMF
(Autoritédes marchés financiers) with assistance of the China Securities Regulatory
Commission and the Monetary Authority of Singapore, bringing together the contribution
of relevant IOSCO Policy committees and related stakeholders.
Australian Cyber Security Strategy lays out initiatives under five themes for action by the
Government to improve cyber security, up to the year 2020: 1) A national cyber
partnership; 2) Strong cyber defenses; 3) Global responsibility and influence; 4) Growth
and innovation; and 5) A cyber smart nation.
The initiatives are intended to be reviewed and updated annually, while the Strategy
document itself will be updated every four years. (FSB-STi)
76. EU General Data Protection Regulation (Apr 2016)
The EU General Data Protection Regulation, GDPR, was set into place in April 2016 and
will come into force in May 2018. The new EU Regulation repeals the Data Protection
Directive of 1995 and replaces local laws for data protection, bringing a single standard
among all EU member states.
Some important highlights of the regulation include the following issues of scope: 1)
responsibility of data protection, including demonstration of compliance (accountability
principle), now extends to data processor and not just the data controller (i.e. a supervisor
can supervise processors directly as well); 2) scope of the law follows the data – GDPR is
applicable to entities outside the EU if they are servicing EU member states; 3) includes
not just direct personal data but any derived data that can be either by itself or in
combination with other data be identified back to an individual.
• Data portability and “Right to be Forgotten” – individual’s right to their own data
and to have it be transported or deleted if certain conditions are met.
• Elevation of importance of data protection through imposing principles of “data
protection by design” and “data protection by default.”
• Required maintenance of a record of all processing activities
54
Financial Sector’s Cybersecurity: A Regulatory Digest
• Data breach notification to the supervisory authority within 72 hours (and to the
individuals in cases of high risk) unless it can “demonstrate that the breach is
unlikely to result in a risk to the rights and freedoms of natural persons.”
• Security measures, such as encryption and pseudonymisation, to be taken based on
risks for the individuals’ data compromise.
• Responsibility of carrying out Data Protection Impact Assessments to “evaluate, in
particular, the origin, nature, particularity and severity” of risk of data compromise,
to then take commensurate steps to mitigate, or report to the supervisory authority
prior to processing.
• Explicit details on administrative fines (except in Denmark and Estonia where legal
system prohibits) setting maximum figures based on categories.
77. ASIC - Cyber resilience assessment report: ASX Group and Chi-X Australia Pty
Ltd (Mar 2016)
This report by the Australian Securities & Investment Commission (ASIC) presents the
findings of the cyber resilience assessments of ASX Group and Chi-X Australia Pty Ltd.
It also provides some examples of emerging good practices implemented by a wider
sample of organisations operating in the Australian financial sector. (FSB-STi)
78. ISO/IEC - IT, Security Techniques, InfoSec Management Systems (Feb 2016)
55
Financial Sector’s Cybersecurity: A Regulatory Digest
The Directive (PSD2) revises the PSD, adopted in 2007, “provides legal foundation for
further development of a better integrated internal market for electronic payments within
the EU”. It takes into account new market entrants offering services, specifically “account
information services” (which allow a payment service user to have an overview of their
financial situation at any time) and “payment initiation services” (which allow consumers
to pay via credit transfer from accounts without intermediaries).
This is made possible as banks will be required to open up customer data via a standard set
of Application Programming Interfaces (APIs). It enhances consumer rights, including
removal of surcharges for use of credit or debit card, reduced liability for non-authorized
payments, and unconditional refund right for euro direct debits. It enhances to role of the
EBA to develop a public central register of authorized payment institutions undated by
national authorities, to resolve disputes from national authorities, develop regulatory
56
Financial Sector’s Cybersecurity: A Regulatory Digest
The South African Ministry of State Security published a National Cybersecurity Policy
Framework document, establishing the following:
"a) The development and implementation of a Government led, coherent and integrated
cybersecurity approach to address cybersecurity threats;
b) Establishing a dedicated policy, strategy and decision making body to be known as the
JCPS to identify and prioritise areas of intervention and focussed attention regarding
Cybersecurity related threats. The Cybersecurity Response Committee will be chaired by
the State Security Agency (SSA) and will be a situated at the SSA
i) The establishment of public-private partnerships for national and action plans in line
with the NCPF; and
(FSB-STi)
57
Financial Sector’s Cybersecurity: A Regulatory Digest
The French government published a revised National Digital Security Strategy which set
out five objectives: 1) Fundamental interests, defence and security of State information
systems and critical infrastructures, major cybersecurity crisis; 2) Digital trust, privacy,
personal data, cybermalevolence; 3) Awareness raising, initial training, continuing
education; 4) Environment of digital technology businesses, industrial policy, export and
internationalization; and 5) Europe, digital strategic autonomy, cyberspace stability. (FSB-
STi)
82. MAS Circular - Tech Risk and Cybersecurity Training for Board (Oct 2015)
83. HKMA Supervisory Policy Manual, Risk Management of E-banking (Sep 2015)
Hong Kong Monetary Authority (HKMA) released a guidance note for authorized
institutions, a Supervisory Policy Manual titled "Risk Management for E-banking, defined
as "financial services (which could be transactional, enquiry or payment services)
provided to personal or business customers and delivered over the Internet, wireless
networks, automatic teller machines (ATMs), fixed telephone networks or other electronic
terminals or devices." Specifically referenced are (i) Internet banking; (ii) contactless
mobile payments; (iii) financial services delivered through self-service terminals; and (iv)
phone banking.
84. Japan’s National Center of Incident Readiness and Strategy for Cybersecurity
(Sep 2015)
The Japanese government published a Cybersecurity Strategy document under the care of
the National Center of Incident Readiness and Strategy for Cybersecurity formulated
pursuant to the Basic Act that prescribes the Government’s responsibility to establish the
Cybersecurity Strategy. The strategy outlines the basic directions of Japan’s
58
Financial Sector’s Cybersecurity: A Regulatory Digest
cybersecurity policies for the coming three years approximately “…to ensure a free, fair,
and secure cyberspace; and subsequently contribute to improving socio-economic vitality
and sustainable development, building a society where people can live safe and secure
lives, and ensuring peace and stability of the international community and national
security.”
The National Center of Incident Readiness and Strategy for Cybersecurity conducts a
cross-sectoral cybersecurity exercise for 13 critical infrastructures, including the financial
sector. (FSB-STi)
The Monetary Authority of Singapore’s Circular No. SRD TR 01/2015 requires that
financial institutions not only secure their perimeters from a potential breach, but also have
robust capabilities to promptly detect any cyber intrusions so as to enable swift containment
and recovery. It considers important that financial institutions maintain a keen sense of
situational awareness by continuously enhancing their technical and internal control
processes to monitor and detect intrusions in their networks, systems, servers, network
devices and endpoints.
86. SEBI Cyber Security and Cyber Resilience framework of Stock Exchanges,
Clearing Corporation and Depositories (Jul 2015)
Securities and Exchange Board of India (SEBI) published a framework regarding cyber
security and cyber resilience that Market Infrastructure Institutions would be required to
comply with in six months' time. The document specifies that "Cyber security framework
include measures, tools and processes that are intended to prevent cyber attacks and
improve cyber resilience. Cyber Resilience is an organisation’s ability to prepare and
respond to a cyber attack and to continue operation during, and recover from, a cyber
attack." The Framework content is organized in the following sections: 1) Governance;
2) Identify; 3) Protection; 4) Monitoring and Detection; 5) Response and Recovery; 6)
Sharing of Information; 7) Training; and 8) Periodic Audit. (FSB-STi)
87. JFSA Policy Approaches to Strengthen Cyber Security in the Financial Sector
(Jul 2015)
The Japanese Financial Services Agency (JFSA) published policy approaches that address
cybersecurity for the financial sector in July 2015. The JFSA has been conducting the
supervision and inspection regarding cyber security management as a part of system risk
control. Given that the threat of cyber attacks is a significant risk for the stability of the
financial system, it is necessary to enhance the resilience of the financial system by
strengthening the cyber security of not only each financial institution but the financial
industry as a whole.
The JFSA will address the five policies below to contribute to strengthening cyber
security in the financial sector from the financial regulator’s perspective:
59
Financial Sector’s Cybersecurity: A Regulatory Digest
In addition, the JFS A conducted industry-wide exercises for the first time in October
2016. A year later, the JFSA conducted a more inclusive industry-wide exercise (Delta
Wall II) to upgrade capability of small and medium-sized financial institutions and to
encourage large financial institutions to utilize more sophisticated evaluation methods to
further improve their capability to address cyber security risks. (FSB-STi)
“…Prudential Standard CPS 231 Outsourcing (CPS 231) and Prudential Standard SPS
231 Outsourcing (SPS 231) include requirements relating to the risk management of
outsourcing arrangements. In November 2010, APRA wrote to all regulated entities
highlighting key prudential concerns that should be addressed when outsourcing includes
the use of cloud computing services. More recently, APRA has observed an increase in
the volume, materiality and complexity of outsourcing arrangements involving shared
computing services (including cloud) submitted to APRA under the consultation and
notification requirements of CPS 231 and SPS 231. APRA’s review of these arrangements
has identified some areas of weakness, reflecting risk management and mitigation
techniques that are yet to fully mature in this area. Further guidance may therefore be
beneficial.
This Information Paper outlines prudential considerations and key principles that could
be considered when contemplating the use of shared computing services. This Information
Paper is relevant for a broad audience including senior management, risk management,
technical specialists and Internal Audit. Finally, APRA has a number of existing
prudential standards and practice guides that are pertinent to shared computing services.
This Information Paper applies the concepts included in those standards and guides…”
(FSB-STi)
60
Financial Sector’s Cybersecurity: A Regulatory Digest
societies, credit unions and dual-regulated (FCA and PRA regulated) investment firms,
effective March 2016:
“While the Senior Managers Regime will ensure that senior managers can be held
accountable for any misconduct that falls within their areas of responsibilities, the new
Certification Regime and Conduct Rules aim to hold individuals working at all levels in
banking to appropriate standards of conduct ...
• The Senior Managers Regime focuses on individuals who hold key roles and
responsibilities in relevant firms. Preparations for the new regime will involve
allocating and mapping out responsibilities and preparing Statements of
Responsibilities for individuals carrying out Senior Management Functions
(SMFs). While individuals who fall under this regime will continue to be
preapproved by regulators, firms will also be legally required to ensure that they
have procedures in place to assess their fitness and propriety before applying for
approval and at least annually afterwards.
• The Certification Regime applies to other staff who could pose a risk of significant
harm to the firm or any of its customers (for example, staff who give investment
advice or submit to benchmarks). These staff will not be preapproved by regulators
and firms’ preparations will need to include putting in place procedures for
assessing for themselves the fitness and propriety of staff, for which they will be
accountable to the regulators. These preparations will be important not only when
recruiting for roles that come under the Certification Regime but when reassessing
each year the fitness and propriety of staff who are subject to the regime.
• The Conduct Rules set out a basic standard for behavior that all those covered by
the new regimes will be expected meet. Firms’ preparations will need to include
ensuring that staff who will be subject to the new rules are aware of the conduct
rules and how they apply to them. Individuals subject to either the SMR or the
Certification Regime will be subject to Conduct Rules from the commencement of
the new regime on 7th March 2016, while firms will have a year after
commencement to prepare for the wider application of the Conduct Rules to other
staff.”
90. SFC Circular to all Licensed Corporations on Internet Trading (Jun 2015)
"The Checklist provides guidance for [Licensed Companies (LCs)] to conduct regular
self-assessment of their internet trading systems, network infrastructure, related policies,
procedures and practices in order to identify areas that require improvement and, where
needed, enhance the same so to ensure compliance with the relevant electronic trading
requirements.
Given the potential impact to investors and to market integrity, LCs providing internet
trading services to clients are expected to closely monitor the integrity, reliability, security
61
Financial Sector’s Cybersecurity: A Regulatory Digest
and capacity of the internet trading systems and maintain sufficient resources to cope with
any increase in business volume transacted through their internet trading systems. LCs
are also expected to complete the Checklist as part of their regular review of their internet
trading systems and rectify deficiencies (if any) as soon as practicable." (FSB-STi)
The U.S. Securities and Exchange Commission (SEC) issued a guidance note on
cybersecurity: "Registered investment companies (“funds”) and registered investment
advisers (“advisers”) may wish to consider in addressing cybersecurity risk, including the
following, to the extent they are relevant:
Conduct a periodic assessment of: (1) the nature, sensitivity and location of information
that the firm collects, processes and/or stores, and the technology systems it uses; (2)
internal and external cybersecurity threats to and vulnerabilities of the firm’s information
and technology systems; (3) security controls and processes currently in place; (4) the
impact should the information or technology systems become compromised; and (5) the
effectiveness of the governance structure for the management of cybersecurity risk. An
effective assessment would assist in identifying potential cybersecurity threats and
vulnerabilities so as to better prioritize and mitigate risk.
Create a strategy that is designed to prevent, detect and respond to cybersecurity threats.
Such a strategy could include: (1) controlling access to various systems and data via
management of user credentials, authentication and authorization methods, firewalls
and/or perimeter defenses, tiered access to sensitive information and network resources,
network segregation, and system hardening; (2) data encryption; (3) protecting against the
loss or exfiltration of sensitive data by restricting the use of removable storage media and
deploying software that monitors technology systems for unauthorized intrusions, the loss
or exfiltration of sensitive data, or other unusual events; (4) data backup and retrieval; and
(5) the development of an incident response plan. Routine testing of strategies could also
enhance the effectiveness of any strategy.
Implement the strategy through written policies and procedures and training that provide
guidance to officers and employees concerning applicable threats and measures to
prevent, detect and respond to such threats, and that monitor compliance with
cybersecurity policies and procedures. Firms may also wish to educate investors and
clients about how to reduce their exposure to cyber security threats concerning their
accounts.” (FSB-STi)
62
Financial Sector’s Cybersecurity: A Regulatory Digest
regulatory approach is intended to enable the banking corporation to adapt its defense
system in a dynamic manner to the changing cyber-threat landscape. Therefore, the
Directive defines principles for cyber-defense, rather than specifying a strict “list of
controls”. The expectation is that the banking corporation shall adopt these principles while
establishing a cyber-defense array in accordance with the scope and the nature of its
business activity, and its risk profile.
The Australian Securities & Investment Commission’s (ASIC) report “Cyber resilience:
health check” is intended to help regulated entities improve their cyber resilience by
increasing awareness of cyber risks, encouraging collaboration between industry and
government, and identifying opportunities to improve cyber resilience. It also aims to
identify how cyber risks should be addressed as part of current legal and compliance
obligations relevant to ASIC’s jurisdiction.
Japan adopted the Basic Act on Cybersecurity in November 2014. The purpose of this Act
is to promote cybersecurity, given the intensification of threats on a worldwide scale, and
the need to ensure the free flow of. In addition to requiring the national and local
governments to take measures to boost cybersecurity, the law obligates businesses related
to infrastructure and cyber-businesses to take voluntary measures to enhance
cybersecurity and cooperate with the government on implementation of relevant
measures. The government provides support for cybersecurity measures for infrastructure
businesses.
63
Financial Sector’s Cybersecurity: A Regulatory Digest
The Cybersecurity Strategic Headquarters are established under the Cabinet. “The
promotion of the Cybersecurity policy must be required to be carried out in consideration
of the basic principles of the Basic Act on the Formation of an Advanced Information and
Telecommunications Network Society.” (FSB-STi)
Italy's CODISE (the acronym of the Italian “continuità di servizio” (business continuity),
created in 2003, is responsible for crisis management coordination in the Italian financial
marketplace. It is chaired by the Banca d'Italia and includes representatives of Italian
Securities Commission (CONSOB) and the systemically important financial institutions.
CODISE's objectives, its roles, responsibilities and activities are described in the newly
published guide. "It serves to purpose to facilitate the exchange of information, the
adoption of the necessary measures to deal with events that may put at risk the system
business continuity, the smooth functioning of financial infrastructures and the public
confidence in money. Interventions are defined according to the type of event, its extent
and its potential impacts on the financial system.
CODISE plans and executes simulations to check the adequacy of its procedures, while
allowing participants to test their internal procedures for business continuity management.
It is also a forum for analysis and discussion among its participants on the evolution of
business continuity threats, risk prevention and control measures including cyber
security." (FSB-STi)
The main objectives of standardisation for information security provision for Russian
banking system organisations include:
64
Financial Sector’s Cybersecurity: A Regulatory Digest
This Notice applies to all: (a) approved exchanges; (b) licensed trade repositories; (c)
approved clearing houses; (c) recognized clearing houses which are incorporated in
Singapore; (d) holders of a capital markets services license; (e) recognized market
operators which are incorporated in Singapore; and (f) persons who are approved under
section 289 of the Act to act as a trustee of a collective investment scheme which is
authorized under section 286 of the Securities and Futures Act and constituted as a unit
trust.
Spain published a National Cyber Security Strategy that establishes the guiding principles
of cybersecurity, namely:
The overall objective of the strategy is to ensure that “Spain makes secure use of
information and telecommunication systems, strengthening cyber attack prevention,
defence, detection, analysis, investigation, recovery and response capabilities.” To
achieve this, the strategy lays down specific objectives, action lines and establishes the
organizational structure under the direction of the Prime Minister. (FSB-STi)
Building on the first Strategy (2011), which appointed the Cyber Security Council (which
provides requested and unrequested advice to the government, and also has as task
ensuring the performance of the National Cyber Security Strategy (NCSS)), the Dutch
Ministry of Security and Justice published its NCSS2.
The NCSS2 outlines the government's commitments, over the period into 2016, to the
following five strategic objectives, that the Netherlands: 1) is resilient to cyber attacks and
protects its vital interests in the digital domain; 2) tackles cyber crime; 3) invests in secure
65
Financial Sector’s Cybersecurity: A Regulatory Digest
ICT products and services that protect privacy; 4) builds coalitions for freedom, security
and peace in the digital domain; and 5) has sufficient cyber security knowledge and skills
and invests in ICT innovation."
The strategy includes strengthening of its National Cyber Security Centre (NCSC),
instituting “a stronger structure for confidential information-sharing and analysis.
Furthermore, the NCSC assumes the role of expert authority, providing advice to private
and public parties involved, both when asked and at its own initiative. Finally, based on
its own detection capability and its triage role in crises, the NCSC develops into Security
Operations Centre (SOC) in addition to its role as a Computer Emergency Response Team
(CERT)." (FSB-STi)
OSFI does not currently plan to establish specific guidance for the control and
management of cyber risk. Notwithstanding, and in line with its enhanced focus on cyber
security as highlighted in its Plan and Priorities for 2013-2016, OSFI may request
institutions to complete the template or otherwise emphasize cyber security practices
during future supervisory assessments…
This self-assessment template sets out desirable properties and characteristics of cyber
security practices that could be considered by a FRFI when assessing the adequacy of its
cyber security framework and when planning enhancements to its framework.”
The assessment asks the institutions to rate their level of implementation ‘maturity’ in six
areas: 1. Organization and Resources; 2. Cyber Risk and Control Assessment; 3.
Situational Awareness; 4. Threat and Vulnerability Risk Management; 5. Cyber Security
Incident Management; and 6. Cyber Security Governance. (FSB-STi)
This guide by the Australian Securities & Investment Commission (ASIC) includes an
addendum on market licensee systems and controls from November 2012. “The guide
outlines [ASIC’s] role in and approach to financial market regulation under the
Corporations Act 2001. It deals with financial markets operating in Australia, with
particular focus on Australian operators…” (FSB-STi)
66
Financial Sector’s Cybersecurity: A Regulatory Digest
ASIC also has a report titled “Cyber Resilience: Health Check” of March 2015. AISC has
under its jurisdiction FMIs, trading venues, banks, insurance companies, broker-dealers,
asset managers, and pension funds.
103. ACPR guidance: risks associated with cloud computing (Jul 2013)
The Monetary Authority of Singapore (MAS) published a Guideline to "set out risk
management principles and best practice standards to guide the FIs in the following: a.
Establishing a sound and robust technology risk management framework; b.
Strengthening system security, reliability, resiliency, and recoverability; and c. Deploying
strong authentication to protect customer data, transactions and systems." (FSB-STi)
67
Financial Sector’s Cybersecurity: A Regulatory Digest
105. APRA Prudential Practice Guide CPG 234 – Management of Security Risk
in Information and Information Technology (May 2013)
This PPG aims to assist regulated institutions in the management of security risk in
information and information technology (IT). It is designed to provide guidance to senior
management, risk management and IT security specialists (management and operational).
The PPG targets areas where APRA continues to identify weaknesses as part of its
ongoing supervisory activities. The PPG does not seek to provide an all-encompassing
framework, or to replace or endorse existing industry standards and guidelines.
The People’s Bank of China issued an “Implementation guide for classified protection of
information system of financial industry” (part of unofficial English version) in July 2012.
It is meant for use by the departments of financial institution (including its affiliates), e.g.
system planning and development (service and technology), application development,
system operation, security management, system use, internal supervision and audit. It
also may serve as basis for supervision, inspection, and guidance for information security
functions. (FSB-STi)
107. World Bank - General Principles for Credit Reporting (Sep 2011)
World Bank Financial Infrastructure Series - General Principles for Credit Reporting
Abstract: “This report describes the nature of credit reporting elements which are crucial
for understanding credit reporting and to ensuring that credit reporting systems are safe,
efficient and reliable. It intends to provide an international agreed framework in the form
of international standards for credit reporting systems’ policy and oversight. The Principles
68
Financial Sector’s Cybersecurity: A Regulatory Digest
for credit reporting are deliberately expressed in a general way to ensure that they can be
useful in all countries and that they will be durable. These principles are not intended for
use as a blueprint for the design or operation of any specific system, but rather suggest the
key characteristics that should be satisfied by different systems and the infrastructure used
to support them to achieve a stated common purpose, namely expanded access and
coverage, fair conditions, and safe and efficient service for borrowers and lenders. Section
two provides a brief overview of the market for credit information sharing and credit
reporting activities and then analyzes in some detail the key considerations underlying
credit reporting. Section three outlines the general principles and related roles. Section four
proposes a framework for the effective oversight of credit reporting systems.”
108. BCBS Principles for the Sound Management of Operational Risk (Jun 2011)
Basel Committee on Banking Supervision (BCBS)’s Principles for the Sound Management
of Operational Risk and the Role of Supervision updates and replaces the 2003 Sound
Practices for the Management and Supervision of Operational Risk. This document
incorporates the evolution of sound practice and details eleven principles of sound
operational risk management covering (1) governance, (2) risk management environment
and (3) the role of disclosure.
It covers fundamental principles of operational risk management: first, for the Board of
Directors to establish a strong risk management culture, maintaining a framework for
operational risk management fully integrated into the bank’s overall risk management
processes. Under Governance, it details the role of Board of Directors and Senior
Management. Risk Management Environment section includes risk Identification and
Assessment, regular Monitoring and Reporting, strong Control and Mitigation practices.
The principles also speak to Business Resiliency and Continuity plans, as well as public
disclosures to allow stakeholders’ assessment of operational risk management.
Of relevance to cyber issues is Technology Risk and Outsourcing, specifically that Senior
management needs to ensure that staff responsible for managing operational risk coordinate
and communicate effectively with those responsible for outsourcing arrangements. The
Control and Mitigation section includes the requirement to have an integrated approach to
identifying, measuring, monitoring and managing technology risks. Further, it details that
“the board and senior management are responsible for understanding the operational risks
associated with outsourcing arrangements and ensuring that effective risk management
policies and practices are in place to manage the risk in outsourcing activities” and
delineates activities that outsourcing policies and risk management should encompass.
69
Financial Sector’s Cybersecurity: A Regulatory Digest
It also identifies certain specific minimum elements that should be part of an institution’s
customer awareness and education program.” “Financial institutions should use this
guidance when evaluating and implementing authentication systems and practices whether
they are provided internally or by a service provider. Although this guidance is focused on
the risks and risk management techniques associated with the Internet delivery channel, the
principles are applicable to all forms of electronic banking activities.”
New guidance took effect January 2012 for examiners to formally assess institutions
against these enhanced expectations.
System and Organization Controls (SOC) is a suite of service offerings (independent audit
reports) that Certified Public Accountants may provide in connection with system level
controls of a service organization or entity-level controls of other organizations. They are
independent attestations of an organization’s operating environment, similar to the ISO
certifications, a well-recognized audit regime that covers both financial and security
aspects.
The European Union Agency for Network and Information Security (ENISA) guide was
released “to assist authorities in Member States to better understand the complexities of
exercises and help them prepare local and national ones. This guide was prepared by
70
Financial Sector’s Cybersecurity: A Regulatory Digest
interviewing experts on exercises throughout the EU and beyond with the aim to identify
good practices that were already applied and proved to be effective.”
“The guide examines these practices by first giving an introduction to the subject of
exercises, then reviewing the life-cycle of an exercise (identifying, planning, conducting,
and evaluating) systematically. Also, the roles of the involved stakeholders are presented.
Throughout the guide, good practices are highlighted for easy identification.”
Given strong commitment by the EU institutions and the Member States to the resilience
of public communications networks, the European Union Agency for Network and
Information Security (ENISA) was asked to help Member States and EU institutions to
identify good practices in incident reporting schemes. This document addresses many of
the issues that Member States will face as they debate, take stock, establish, launch, develop
and harmonize their incident reporting systems at national level. The report discusses
schemes for reporting incidents that may harm or threaten the resilience and security of
public eCommunication networks. It examines the whole lifecycle of a reporting scheme,
from the first steps in designing the scheme, through engaging the constituency’s
cooperation, setting the reporting procedures, and then management and improvement of
the scheme.
114. German Federal Office for Information Security Act (Aug 2009)
The Act established a Federal Office of Information Security to be overseen by the Federal
Ministry of the Interior, to perform specific tasks to promote security of information
technology and to be the central clearinghouse for cooperation among federal authorities
in matters related to the security of information technology. (FSB-STi)
The South Korean Electronic Financial Transactions Act was enacted in January 2007. The
Act (last amended May 2013) and Enforcement Decree (last amended March 2014) is for
“ensuring the security and reliability of electronic financial transactions by clarifying their
legal relations and to promoting financial conveniences for people and developing the
national economy by creating a foundation for the sound development of electronic
financial industry.” It provides the legal grounds for the financial sector regulators to
conduct supervision and examination of financial institutions and electronic financial
business operators. According to the Act and other related regulations, Financial
Institutions (FIs) should adopt comprehensive measures to better cope with cyber threats
and manage related risks.
71
Financial Sector’s Cybersecurity: A Regulatory Digest
are “required for securing the safety of the information technology sector of an institution
subject to examination by the Financial Supervisory Service under other Acts and
subordinate statutes.” It addresses “Rights and Obligations of Parties to Electronic
Financial Transactions”; “Securing the Safety of Electronic Financial Transactions and
Protecting Users”; “Licensing, Registration and Operation of Electronic Financial Affairs”;
and “Supervision of Electronic Financial Affairs”. It includes explanatory Tables on
“Standards for Computing the Number of IT Personnel and Information Protection
Personnel”; “Standards for IT Sector and Information Protection Budgets”; “Specific
Limits on Use of Means of Electronic Payment”; “Prerequisites for Major Investors”;
“Financial Companies Subject to Evaluation of IT Sector Operation”; and “Types of Assets
with Low Investment Risk”.
72
Financial Sector’s Cybersecurity: A Regulatory Digest
Please see separate “Source Table” file, tab labeled: “Appendix: Index by Concepts”.
i“FSB-ST” denotes those items mentioned in the “FSB Stocktake on Financial Sector Cybersecurity
Regulations, Guidance and Supervisory Practices”. See coverage in Digest.
73