FFIEC, on behalf of its members, issued a statement to address the use of cloud computing services and security risk management principles in the financial services sector. The statement highlights examples of risk management practices for a financial institution’s safe and sound use of cloud computing services and safeguards to protect the sensitive information of consumers. The statement also provides a list of government and industry resources and references to assist financial institutions using cloud computing services.
The statement does not contain new regulatory expectations, though it highlights that management should not assume that effective security and resilience controls exist simply because the technology systems are operating in a cloud computing environment. The statement identifies the responsibilities financial institutions would have when contracting with cloud computing providers. Examples of relevant risk management practices for assessing risks related to and implementing controls for cloud computing services include the following:
- The financial institution’s plans for the use of cloud computing services should align with its overall IT strategy, architecture, and risk appetite. This includes determining the appropriate level of governance, the types of systems and information assets considered for cloud computing environments, the impact on the financial institution’s architecture and operations model, and management’s comfort with its dependence on and its ability to monitor the cloud service provider.
- Appropriate due diligence and ongoing oversight and monitoring of cloud service providers’ security is required. As with all other third-party relationships, security-related risks should be identified during planning, due diligence, and the selection of the cloud service provider.
- Contracts between a financial institution and cloud service provider should be drafted to clearly define which party has responsibilities for configuration and management of system access rights, configuration capabilities, and deployment of services and information assets to a cloud computing environment, among other things.
- An effective inventory process for the use of cloud computing environments is an essential component for secure configuration management, vulnerability management, and monitoring of controls.
- Common practices for identity and access management for resources using cloud computing infrastructures include limiting account privileges, implementing multi-factor authentication, frequently updating and reviewing account access, monitoring activity, and requiring privileged users to have separate usernames and passwords for each segment of the cloud service provider’s and financial institution’s networks.
- Operations moved to cloud computing environments should have resilience and recovery capabilities commensurate with the risk of the service or operation for the financial institution. Management should review and assess the resilience capabilities and service options available from the cloud service provider.
The risk management considerations outlined in the statement provide a summary of key controls that management may consider as part of assessing and implementing cloud computing services. However, specific risk management and controls will be dependent on the nature of the outsourced services and the specifics of the cloud implementation. Additional information on general third-party risk management and outsourcing practices is available in the FFIEC Information Technology Examination Handbook’s “Outsourcing Technology Services” booklet and other documents published by the FFIEC members.
Keywords: Americas, US, Banking, Cloud Computing, Risk Management, Governance, Cyber Risk, FFIEC
Previous ArticleFED Expands Access to Paycheck Protection Program Liquidity Facility
ECB published a decision allowing the euro area banks under its direct supervision to exclude certain central bank exposures from the leverage ratio.
ESAs launched a survey seeking feedback on the presentational aspects of product templates under the Sustainable Finance Disclosure Regulation (SFDR or Regulation 2019/2088).
ECB published input of the European System of Central Banks (ESCB) into the EBA feasibility report on reducing the reporting burden for banks in EU.
ECB finalized the guide on assessment methodology for the internal model method for calculating exposure to counterparty credit risk (CCR) and the advanced method for own funds requirements for credit valuation adjustment (A-CVA) risk.
EBA published an Opinion addressed to EC to raise awareness about the opportunity to clarify certain issues related to the definition of credit institution in the upcoming review of the Capital Requirements Directive and Regulation (CRD and CRR).
APRA is consulting on updates to ARS 210.0, the reporting standard that sets out requirements for provision of information on liquidity and funding of an authorized deposit-taking institution.
FED released hypothetical scenarios for a second round of stress tests for banks.
FED is proposing to temporarily revise the capital assessments and stress testing reports (FR Y-14A/Q/M) to implement the changes necessary to conduct stressed analysis in connection with the re-submission of capital plans, using data as of June 30, 2020.
FED adopted a proposal to extend for three years, with revision, the information collection under the market risk capital rule (FR 4201; OMB No. 7100-0314).
EBA published a voluntary online survey seeking input from credit institutions on their practices and future plans for Pillar 3 disclosures on the environmental, social, and governance (ESG) risks.