FSB is consulting on a toolkit of effective practices to assist financial institutions in their cyber incident response and recovery activities. The toolkit lists 46 effective practices that have been structured across seven components. These components are governance, preparation, analysis, mitigation, restoration, improvement, and coordination and communication. FSB welcomes comments and responses, by July 20, 2020, to the questions set out in the consultation. This consultation report was sent to G20 Finance Ministers and Central Bank Governors for their virtual meeting on April 15.
Efficient and effective response to and recovery from a cyber incident by organizations in the financial ecosystem is essential to limiting any related financial stability risks. The toolkit draws from survey responses by national authorities, international organizations, and external stakeholders; a review of the existing standards and case studies of cyber incidents; engagement with external stakeholders at workshops and bilateral meetings; and insights drawn from national authorities based on their supervisory work. The toolkit is structured across the following seven components:
- Governance—This component frames the way in which cyber incident and recovery is organized and managed. It aligns cyber incident and recovery activities with goals set for continuity of business operations. It sets the organizational structures and roles required to coordinate response and recovery across internal functions, business lines, firms, jurisdictions, or even sectors. Governance involves defining the decision-making framework and allocates responsibilities and accountabilities to ensure that the right stakeholders are engaged when a cyber incident occurs.
- Preparation—The aim should be to establish and maintain capabilities to respond to cyber incidents and to restore critical functions, processes, activities, systems, and data affected by cyber incidents to normal operations. While preparation is a phase before an incident, it significantly and directly influences the effectiveness of cyber incident and recovery activities.
- Analysis—Analysis is conducted to ensure effective response and recovery activities, including forensic analysis, and to determine the severity, impact, and root cause of the cyber incident to drive appropriate response and recovery activities.
- Mitigation—Activities related to mitigation are performed to prevent the aggravation of the situation and eradicates cyber threats in a timely manner to alleviate their impact on business operations and services.
- Restoration—Organizations repair and restore systems or assets affected by a cyber incident to safely resume business-as-usual delivery of impacted services.
- Improvement—Organizations establish processes to improve response and recovery capabilities through the lessons learned from past cyber incidents and from proactive tools such as cyber incident and recovery exercises. Necessary changes are made to cyber incident and recovery policies, plans, and playbooks to improve the overall process as well as any necessary training and testing. Lessons learned are used in the selection and implementation of additional controls and mitigation measures.
- Coordination and communication—The aim should be to coordinate with stakeholders to maintain good cyber situational awareness and enhance cyber resilience of the ecosystem. Progress and outcomes from the cyber incident analysis are shared with internal and external stakeholders to take actions to contain, mitigate, recover, or prevent a cyber incident and to ensure that no misunderstandings or rumors arise from lack of information. A common, secure, and trusted communication channel enhances the efficiency and security of information-sharing.
Enhancing cyber incident response and recovery at organizations is an important focus for national authorities. National authorities are in a unique position to gain insights on effective cyber incident response and recovery activities in financial institutions from their supervisory work and from their observations across multiple organizations and peer analyses that can help suggest areas that both authorities and organizations can enhance. The final toolkit, taking on board the feedback from this public consultation, will be sent to the October meeting of G20 Finance Ministers and Central Bank Governors.
Keywords: International, Banking, Insurance, Securities, Cyber Incident, Governance, Response and Recovery, Toolkit, Operational Risk, Cyber Risk, FSB
Previous ArticleFIN-FSA Announces Measures to Address Impact of COVID-19 Outbreak
BCBS amended the guidelines on sound management of risks related to money laundering and financing of terrorism (ML/FT).
EBA finalized the guidelines on treatment of structural foreign-exchange (FX) positions under Article 352(2) of the Capital Requirements Regulation (CRR).
FSB published a statement on the impact of COVID-19 pandemic on global benchmark transition.
IAIS published the list of Internationally Active Insurance Groups (IAIGs) publicly disclosed by group-wide supervisors.
FED has temporarily revised the reporting form on consolidated financial statements for holding companies (FR Y-9C; OMB No. 7100-0128).
EC launched a consultation on the review of the key elements of Solvency II Directive, with the comment period ending on October 21, 2020.
ECB launched a consultation on the guide that sets out supervisory approach to consolidation projects in the banking sector.
PRA published a letter that builds on the expectations set out in the supervisory statement (SS3/19) on enhancing banks' and insurers' approaches to managing the financial risks from climate change.
US Agencies (Farm Credit Administration, FDIC, FED, FHFA, and OCC) finalized changes to the swap margin rule to facilitate implementation of prudent risk management strategies at banks and other entities with significant swap activities.
IAIS published technical specifications, questionnaires, and templates for 2020 Insurance Capital Standard (ICS) and Aggregation Method data collections.