FSB is consulting on a toolkit of effective practices to assist financial institutions in their cyber incident response and recovery activities. The toolkit lists 46 effective practices that have been structured across seven components. These components are governance, preparation, analysis, mitigation, restoration, improvement, and coordination and communication. FSB welcomes comments and responses, by July 20, 2020, to the questions set out in the consultation. This consultation report was sent to G20 Finance Ministers and Central Bank Governors for their virtual meeting on April 15.
Efficient and effective response to and recovery from a cyber incident by organizations in the financial ecosystem is essential to limiting any related financial stability risks. The toolkit draws from survey responses by national authorities, international organizations, and external stakeholders; a review of the existing standards and case studies of cyber incidents; engagement with external stakeholders at workshops and bilateral meetings; and insights drawn from national authorities based on their supervisory work. The toolkit is structured across the following seven components:
- Governance—This component frames the way in which cyber incident and recovery is organized and managed. It aligns cyber incident and recovery activities with goals set for continuity of business operations. It sets the organizational structures and roles required to coordinate response and recovery across internal functions, business lines, firms, jurisdictions, or even sectors. Governance involves defining the decision-making framework and allocates responsibilities and accountabilities to ensure that the right stakeholders are engaged when a cyber incident occurs.
- Preparation—The aim should be to establish and maintain capabilities to respond to cyber incidents and to restore critical functions, processes, activities, systems, and data affected by cyber incidents to normal operations. While preparation is a phase before an incident, it significantly and directly influences the effectiveness of cyber incident and recovery activities.
- Analysis—Analysis is conducted to ensure effective response and recovery activities, including forensic analysis, and to determine the severity, impact, and root cause of the cyber incident to drive appropriate response and recovery activities.
- Mitigation—Activities related to mitigation are performed to prevent the aggravation of the situation and eradicates cyber threats in a timely manner to alleviate their impact on business operations and services.
- Restoration—Organizations repair and restore systems or assets affected by a cyber incident to safely resume business-as-usual delivery of impacted services.
- Improvement—Organizations establish processes to improve response and recovery capabilities through the lessons learned from past cyber incidents and from proactive tools such as cyber incident and recovery exercises. Necessary changes are made to cyber incident and recovery policies, plans, and playbooks to improve the overall process as well as any necessary training and testing. Lessons learned are used in the selection and implementation of additional controls and mitigation measures.
- Coordination and communication—The aim should be to coordinate with stakeholders to maintain good cyber situational awareness and enhance cyber resilience of the ecosystem. Progress and outcomes from the cyber incident analysis are shared with internal and external stakeholders to take actions to contain, mitigate, recover, or prevent a cyber incident and to ensure that no misunderstandings or rumors arise from lack of information. A common, secure, and trusted communication channel enhances the efficiency and security of information-sharing.
Enhancing cyber incident response and recovery at organizations is an important focus for national authorities. National authorities are in a unique position to gain insights on effective cyber incident response and recovery activities in financial institutions from their supervisory work and from their observations across multiple organizations and peer analyses that can help suggest areas that both authorities and organizations can enhance. The final toolkit, taking on board the feedback from this public consultation, will be sent to the October meeting of G20 Finance Ministers and Central Bank Governors.
Keywords: International, Banking, Insurance, Securities, Cyber Incident, Governance, Response and Recovery, Toolkit, Operational Risk, Cyber Risk, FSB
Previous ArticleFIN-FSA Announces Measures to Address Impact of COVID-19 Outbreak
EC published Regulation 2021/25 that addresses amendments related to the financial reporting consequences of replacement of the existing interest rate benchmarks with alternative reference rates.
BIS published a bulletin, or a note, that examines the cyber threat landscape in the context of the pandemic and discusses policies to reduce risks to financial stability.
HM Treasury, also known as HMT, has updated the table containing the list of the equivalence decisions that came into effect in UK at the end of the transition period of its withdrawal from EU.
EBA published an erratum for technical package on phase 1 of the reporting framework 3.0.
APRA updated a frequently asked question (FAQ), for authorized deposit-taking institutions, on the measurement of credit risk weighted assets.
EBA published the quarterly risk dashboard, along with the results of the Risk Assessment Questionnaire survey among 60 banks and 15 market analysts.
ECB concluded the public consultation on the introduction of a digital euro in EU.
ECB published a guide that sets out the supervisory approach to consolidation in the banking sector.
The SRB Chair Elke König published an article setting out work priorities for 2021.
FDIC has selected 11 technology companies—including BearingPoint, Fed Reporter, Inc, and S&P Global Market Intelligence, LLC—for inclusion in the third and final phase of the rapid prototyping competition.