FSB is consulting on a toolkit of effective practices to assist financial institutions in their cyber incident response and recovery activities. The toolkit lists 46 effective practices that have been structured across seven components. These components are governance, preparation, analysis, mitigation, restoration, improvement, and coordination and communication. FSB welcomes comments and responses, by July 20, 2020, to the questions set out in the consultation. This consultation report was sent to G20 Finance Ministers and Central Bank Governors for their virtual meeting on April 15.
Efficient and effective response to and recovery from a cyber incident by organizations in the financial ecosystem is essential to limiting any related financial stability risks. The toolkit draws from survey responses by national authorities, international organizations, and external stakeholders; a review of the existing standards and case studies of cyber incidents; engagement with external stakeholders at workshops and bilateral meetings; and insights drawn from national authorities based on their supervisory work. The toolkit is structured across the following seven components:
- Governance—This component frames the way in which cyber incident and recovery is organized and managed. It aligns cyber incident and recovery activities with goals set for continuity of business operations. It sets the organizational structures and roles required to coordinate response and recovery across internal functions, business lines, firms, jurisdictions, or even sectors. Governance involves defining the decision-making framework and allocates responsibilities and accountabilities to ensure that the right stakeholders are engaged when a cyber incident occurs.
- Preparation—The aim should be to establish and maintain capabilities to respond to cyber incidents and to restore critical functions, processes, activities, systems, and data affected by cyber incidents to normal operations. While preparation is a phase before an incident, it significantly and directly influences the effectiveness of cyber incident and recovery activities.
- Analysis—Analysis is conducted to ensure effective response and recovery activities, including forensic analysis, and to determine the severity, impact, and root cause of the cyber incident to drive appropriate response and recovery activities.
- Mitigation—Activities related to mitigation are performed to prevent the aggravation of the situation and eradicates cyber threats in a timely manner to alleviate their impact on business operations and services.
- Restoration—Organizations repair and restore systems or assets affected by a cyber incident to safely resume business-as-usual delivery of impacted services.
- Improvement—Organizations establish processes to improve response and recovery capabilities through the lessons learned from past cyber incidents and from proactive tools such as cyber incident and recovery exercises. Necessary changes are made to cyber incident and recovery policies, plans, and playbooks to improve the overall process as well as any necessary training and testing. Lessons learned are used in the selection and implementation of additional controls and mitigation measures.
- Coordination and communication—The aim should be to coordinate with stakeholders to maintain good cyber situational awareness and enhance cyber resilience of the ecosystem. Progress and outcomes from the cyber incident analysis are shared with internal and external stakeholders to take actions to contain, mitigate, recover, or prevent a cyber incident and to ensure that no misunderstandings or rumors arise from lack of information. A common, secure, and trusted communication channel enhances the efficiency and security of information-sharing.
Enhancing cyber incident response and recovery at organizations is an important focus for national authorities. National authorities are in a unique position to gain insights on effective cyber incident response and recovery activities in financial institutions from their supervisory work and from their observations across multiple organizations and peer analyses that can help suggest areas that both authorities and organizations can enhance. The final toolkit, taking on board the feedback from this public consultation, will be sent to the October meeting of G20 Finance Ministers and Central Bank Governors.
Keywords: International, Banking, Insurance, Securities, Cyber Incident, Governance, Response and Recovery, Toolkit, Operational Risk, Cyber Risk, FSB
Previous ArticleFIN-FSA Announces Measures to Address Impact of COVID-19 Outbreak
The Prudential Regulation Authority (PRA) published the final policy statement PS21/21 on the leverage ratio framework in the UK. PS21/21, which sets out the final policy of both the Financial Policy Committee (FPC) and PRA
The Consumer Financial Protection Bureau (CFPB) proposed to amend Regulation B to implement changes to the Equal Credit Opportunity Act (ECOA) under Section 1071 of the Dodd-Frank Act.
The Prudential Regulation Authority (PRA) decided to maintain, at the 2019 levels, the buffer rates for the Other Systemically Important Institutions (O-SII) for another year, with no new rates to be set until December 2023.
The Financial Stability Board (FSB) published a progress report on implementation of its high-level recommendations for the regulation, supervision, and oversight of global stablecoin arrangements.
In a letter to the authorized deposit taking institutions, the Australian Prudential Regulation Authority (APRA) announced an increase in the minimum interest rate buffer it expects banks to use when assessing the serviceability of home loan applications.
The Committee on Payments and Market Infrastructures (CPMI) and the International Organization of Securities Commissions (IOSCO) are consulting on the preliminary guidance that clarifies that stablecoin arrangements should observe international standards for payment, clearing, and settlement systems.
The European Banking Authority (EBA) and the European Insurance and Occupational Pensions Authority (EIOPA) have set out their respective work priorities for 2022.
The Malta Financial Services Authority (MFSA) updated the guidelines on supervisory reporting requirements under the reporting framework 3.0, in addition to the reporting module on leverage under the common reporting (COREP) framework.
The European Commission (EC) published the Implementing Decision 2021/1753 on the equivalence of supervisory and regulatory requirements of certain third countries and territories for the purposes of the treatment of exposures, in accordance with the Capital Requirements Regulation or CRR (575/2013).
EC published the Implementing Regulation 2021/1751, which lays down implementing technical standards on uniform formats and templates for notification of determination of the impracticability of including contractual recognition of write-down and conversion powers.