Cyber Security Industry Insights
Cyber Security Industry Insights
Cyber Security Industry Insights
March 2019
Search
Contents
1 Introduction 3
9 Next steps 14
prints document
2
Search
1 Introduction
1.2 The principal objective of the groups is to aid the improvement of cyber security
practices amongst members of the CCGs and their sectors. We hope the practices
and experience of the groups will benefit other firms, so we are publishing these
insights to help those firms not already involved.
1.4 In 2019, we will be creating 2 new groups to increase the representation of trading
venues and benchmark administrators, and brokers and principal trading firms.
1.6 Over the last 12 months, the groups have been discussing and sharing innovative
practices in the following discussion areas: Governance, Identification, Protection,
Detection, Situational Awareness, Response and Recovery, and Testing. We have
collated the examples shared by firms and set out those we consider to be beneficial
for a wider audience under each of these themes. These may particularly help small
and medium-sized enterprises.
3
Search
1.7 This document should not be considered FCA guidance. It does not set out what our
expectations are in terms of what systems and controls firms should have in place
to comply with our regulatory requirements. Each of the examples here have been
shared by one or more firms within the CCGs, and many support existing guidance
from the National Cyber Security Centre (NCSC).
4
Search
2.2 Firms shared the following practices and insights for governing cyber. They are aligned
to business objectives and considered as part of the risk-management framework in
their businesses.
A top-down approach
• Put cyber risk on the executive agenda. Use an enterprise risk management
approach to articulate and share cyber risk related to business operations,
customers and reputation. This will help executives place cyber risk within the
appropriate context, and consider it when running their businesses.
Make it simple
• Adopt plain language to articulate cyber. Use language that staff and executives
understand and relates to their day-to-day business activities.
5
Search
• Understand who could target your business, why, and how. Understand what data
is valuable to which malicious actors. Creating profiles for groups such as hostile
nation states, organised criminals, activists, and amateur hackers helps understand
their goals and capabilities.
• Ensure there is a link between risk and controls. Controls exist to mitigate risk.
Create metrics and indicators for critical controls to understand whether they are
functioning effectively. Without understanding the effectiveness of controls, it is
difficult to know if risks are being managed.
• Use existing standards. Standards provide valuable frameworks devised from good
practice; consider the NIST Cybersecurity Framework, ISO27001/2, SANS CIS,
NCSC’s 10 Steps to Cyber Security or NCSC’s NIS Directive Cyber Assessment
Framework, Cyber Essentials, etc.
6
Search
3.1 The complexity of organisations and the pace of change makes it difficult to keep track
of your information and systems, and how they are linked and managed. The identify
domain highlights the importance of understanding what it is you are trying to protect
and how entities are linked. Without this it is not possible to take a risk-based approach
within all other domains.
• Use guidance. Use the guidance already available on GDPR Security Outcomes
to create and maintain a list of information assets. This includes how business
services and processes use them.
• One view is the wrong view. Consider assets from multiple perspectives and draw
in data from many sources. This will help build and maintain a complete picture
of the assets you are trying to protect. It might include combining the output of
information asset management, system asset management and business services.
You should also use change management records, vulnerability scans, anti-virus
management consoles and other sources.
• Where do you spend your money? Ask the Finance department for a complete list
of suppliers.
• Know your business. Stay plugged into new business initiatives so that you can
judge how cyber will need to adapt to the business in the future.
7
Search
4.1 Tackling external threats requires effective cyber security policies, standards,
procedures and controls. These will protect the confidentiality, integrity and availability
of your business services, while limiting and containing the impact of a potential cyber
incident.
Invest in training
• Be targeted. Target training the same way a cyber criminal might target specific
individuals, groups of users or a department, such as those with access to critical
systems. Align training with your employees’ roles, responsibility, duties and access
to data.
• Remember that you cannot transfer the responsibility. Ensure that cyber security
and legal language are added to any contract with the right to audit. Review old
contracts to ensure that you know your position with third parties.
Use encryption
• Too little or too much. Apply encryption controls proportionately. Not all data
requires every control to be applied. You should apply risk management principles
to determine the impact of data being exposed, based on its classification policy.
• Only as strong as your weakest link. Define and monitor the policy and procedural
controls protecting unauthorised access to your cryptographic keys.
• Know your digital footprint. Cloud and mobile technologies have extended the
traditional on-premise ways of working and delivering resilient business services.
You may find your digital footprint is larger than expected.
8
Search
• Not all vulnerabilities can be fixed. Some legacy systems or software cannot be
upgraded or modified. In this case you can apply and test alternative compensating
controls to reduce the risk.
• Security by design. Include your cyber security team as part of the change
management and assurance process. This helps incorporate cyber resilience at
the earliest stage of design, development and system acquisition. It means they
will be there throughout the system development lifecycle and into your change-
management processes.
9
Search
5.1 Firms must be able to detect actual or attempted attacks on systems and business
services. Thorough and effective system monitoring is essential to detection and
helps to ensure that systems are being used in line with organisational policies.
• Who’s who. Tie specific users to specific accounts through your identity and access
management processes. This gives you a solid basis for ensuring individuals have
appropriate access rights, and correctly attributing system misuse.
• Know your privileges. Identify users with privileged access to critical systems, and
review this on a regular basis. Heighten monitoring on these systems and consider
using Data Loss Prevention tools.
• Monitor behaviour. Use network behaviour monitors and user behaviour analysis to
identify deviations from the expected patterns of activity. Pay particular attention
to users with access to critical systems.
• Use the right information for you. Choose which logs to collect based on your
unique circumstances, and generate alerts that are relevant. Ensure these allow
you to see external network communication, cloud services and third parties to
detect Indicators of Compromise.
• Validate. Review and assure your log sources are working as intended. Configure
alerts when systems stop forwarding logs. Being unable to restore your archived
logs during an incident will make it harder to recover. Check that your archived logs
can be securely restored and are searchable.
10
Search
6.1 You need to be alert to emerging threats and issues to make informed cyber resilience
decisions. This intelligence may come from a variety of internal and external sources,
which highlights the importance of sharing intelligence when possible.
• Feed into planning. Use plausible scenarios or examples from the media to
continuously improve and refine how information is shared and communicated to
internal and external stakeholders.
• Learn from others. Use the events that have affected others and assess the
impact against your own firm and defences. Ask yourself if your firm would have
been protected against that incident? Or would that event even affect your firm?
You can learn lessons from both internal and external incidents.
11
Search
7.1 Incidents will occur. The ability to respond and recover from them should be a key
part of a business’s risk management and operational resilience planning. Resuming
critical business services rapidly and with accurate data requires continuity planning
and testing of plausible cyber-attack scenarios. Exercising people, processes and
technology is a key aspect in preparing response and recovery planning.
• Test plausible scenarios. Plan on the assumption that the inevitable will happen,
and test plausible scenarios tailored to your business. Identify your critical services,
people, processes and third parties that underpin these services to assess the
impact on your business.
• Lessons learnt. Allocate enough time and resources for reviewing information
captured during a cyber incident. You can use this to improve your response and
recovery controls.
• Inception to reporting. Evaluate and exercise your cyber capabilities and business
processes by creating and executing plausible threat-driven playbooks. These
should focus on assessing the effects on your critical business services.
7.3 Know the basics. The ability to conduct basic investigations is key. Train your team
with the necessary skills or bring in specialist consultants or third parties. Simulate an
incident investigation process end-to-end to familiarise them with the process.
7.4 Make it work internally. Establishing and testing internal communication channels
with key decision makers will make key decisions faster and simpler in a crisis. It will also
ensure people know who is accountable for decisions.
12
Search
8.1 Testing the cyber defences of your whole organisation ensures you understand the
effectiveness of controls across people, process and technology. A strong testing
regime helps develop a culture for continuous improvement as issues are discovered
and fixed.
• Emulate the threat. Use more than one method to identify and assess your
security vulnerabilities. Considering a variety of proactive methods may provide
greater clarity (for example, penetration testing, phishing simulations, vulnerability
scanning, red/purple teaming).
• Testing approach. Consider the views of your users and security operations centre
when deciding what testing approach to take.
• Make reporting easy. Implement easy ways for staff to report phishing (such as
a button on your email toolbar) and procedures that deal with reported phishing
emails.
13
Search
9 Next steps
9.1 We encourage all firms to consider whether these insights may be useful to them in
considering their own cyber resilience. The insights are also shared with the other
financial authorities who attend CCG meetings, including the Bank of England and the
NCSC. The insights provide a valuable input to help shape NCSC advice and guidance.
14
Pub ref: 005905