2023 IT Examiner School
IT Examiner School
Ju ly 18-27 , 2023 Live Virtual
@ www.csbs.org � @csbsnews
CONFERENCE OF STATE BANK SUPERVISORS 1 300 I Street NW / Suite 700 / Washington, DC 20 005 / (202) 296-2840
IT Examiner School Live Virtual July 18-27, 2023
Week 1 Tuesday, July 18, 2023 12:30 pm – 1:30 pm
Introduction & Pre-Course Review/Terminology
Regulations/Guidance
1:30 pm – 2:15 pm
Break
2:15 pm –2:30 pm
IT Examination Work Programs
2:30 pm – 3:00 pm
Audit
3:00 pm – 4:00 pm
Wednesday, July 19, 2023 12:30 pm – 12:45 pm
Prior Day Review
Audit (continued)
12:45 pm – 1:30 pm
Risk Assessment
1:30 pm – 2:00 pm
Break
2:00 pm – 2:15 pm
Risk Assessment (continued)
2:15 pm – 2:45 pm
Development & Acquisition
2:45 pm – 4:00 pm
Thursday, July 20, 2023 12:30 pm – 12:45 pm
Prior Day Review
Third-Party Risk
12:45 pm – 1:30 pm
Support & Delivery
1:30 pm – 2:30 pm
Break
2:30 pm – 2:45 pm
Support & Delivery (continued
2:45 pm – 4:00 pm
Week 2 Tuesday, July 25, 2023 12:30 pm – 1:00 pm
Prior Day Review
Cybersecurity – FFIEC CAT Tool
1:00 pm – 2:00 pm
Break
2:00 pm – 2:15 pm
Business Continuity Planning/Disaster Recovery (BCP/DR)
2:15 pm – 4:00 pm
Wednes day, July 26, 2023 12:30 pm – 12:45 pm
Prior Day Review
Management
12:45 pm – 2:00 pm
Break
2:00 pm – 2:15 pm
Management
2:15 pm – 2:45 pm
Composite Rating Discussion & Exercise
2:45 pm – 3:15 pm
Breakout Rooms
3:15 pm – 4:00 pm
Thursday , July 27, 2023 12:30 pm – 1:30 pm
Composite Rating Exercise Discussion
Emerging Issues
1:30 pm – 2:00 pm
Break
2:00 pm – 2:15 pm
Emerging Issues (continued)
2:15 pm – 3:30 pm
Final Assessment & Course Wrap Up
3:30 pm – 4:00 pm
Virtual IT Examiner School
Zoom
Schedule This week:
• Tuesday, July 18: 12:30 PM – 4:00 PM ET • Wednesday, July 19: 12:30 PM – 4:00 PM ET • Thursday, July 20: 12:30 PM – 4:00 PM ET Next Week • Tuesday, July 25: 12:30 PM – 4:00 PM ET • Wednesday, July 26: 12:30 PM – 4:00 PM ET • Thursday, July 27: 12:30 PM – 4:00 PM ET
NYS DFS Disclaimer The views expressed are those of the speaker and do not represent the official views of New York State or the NYS Department of Financial Services, aka DFS. Anything said during this training shall not bar, estop, or otherwise prevent DFS, or any federal or other state agency from taking any action different from anything said during this training. Participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.
Introductions
Name
State
IT Exam Experience
Fun fact
Something you hope to learn
Go to www.menti.com and enter Game PIN provided
Regulations & Guidance
The Gramm Leach Bliley Act (GLBA) - 1999 Title V, Subtitle A of the Gramm-Leach-Bliley Act (“GLBA”) governs the treatment of nonpublic personal information (NPPI or NPI ) about consumers by financial institutions. • Section 501 – protection of nonpublic personal information
"It is the policy of the Congress that each financial institution has an affirmative and continuing obligation to respect the privacy of its customers and to protect the security and confidentiality of those customers’ nonpublic personal information" (Section 501(a))
• Section 502 – prohibits financial institutions from disclosing nonpublic personal information about a consumer to non-affiliated third parties, unless (i) the institution satisfies various notice and opt-out requirements; and (ii) the consumer has not elected to opt out of the disclosure • Section 503 - institutions to provide notice of its privacy policies and practices to its customers 501(b) requires each agency or authority to establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical, and physical safeguards: 1. To ensure the security and confidentiality of customer records and information; 2. To protect against any anticipated threats or hazards to the security or integrity of such records; and 3. To protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer.
In 2000, the Board of Governors of the FRS (“Board”), the FDIC, the NCUA, the OCC, and the former OTS, published regulations implementing provisions of GLBA governing the treatment of nonpublic personal information about consumers by financial institutions.
Regulatory Authority Examples: Depository Institutions
Regulators / Licensure FDIC, FRB, OCC, States, CFPB
Laws, Regulations, or Guidance Related to IT, InfoSec, Privacy, etc. 12 CFR 364, Appendix B; Section 501(b) of GLBA; FFIEC; State Laws/Regulations (e.g., Part 500, CCPA)
Type of Entity
Banks (state-member, national, state non-member, credit union)
Bank Holding Companies, Trust Companies, US Branches of FBOs Credit Unions (Federal or State)
FRB, States
Generally, the same as banks (above)
NCUA, States
12 CFR 748 (Appendix A & B)
Regulations & Guidance - FDIC Appendix B, including Supplement, to Part 364 of the FDIC Rules and Regulations – Interagency Guidelines Establishing Information Security Standards
Regulations & Guidance - FRB Appendix D-2, including Supplement, to Part 208 of the FR Rules and Regulations – Interagency Guidelines Establishing Standards for Safeguarding Customer Information
Regulations & Guidance - NCUA Appendix A (“Guidelines for safeguarding member information”) & Appendix B (“Guidance on Response Programs for Unauthorized Access to Member Information and Member Notice”) of 12 CFR 748 (“Security Program”)
Regulatory Authority Examples: Non-Depository Institutions
Regulators / Licensure CFPB, FTC, States
Laws, Regulations, or Guidance Related to IT, InfoSec, Privacy, etc.
Type of Entity
Mortgage Originators and Servicers
16 CFR 314; 501 and 505(b)(2) of GLBA; State Laws and Regulations (e.g., Part 500 and CCPA).
Money Service Businesses / Money Transmitters
FTC, States
Consumer Finance
CFPB, FTC, States
Regulations & Guidance – Non-Depository
16 CFR Part 314 of the FTC Rules and Regulations – “Standards for Safeguarding Customer Information”
• The “Safeguards Rule”, which took effect in 2003, is designed to ensure that covered entities maintain safeguards to protect the security of customer information • It applies to financial institutions subject to FTC jurisdiction and that aren’t subject to enforcement authority of another regulator under Section 505 of the Gramm-Leach-Bliley Act, 15 U.S.C. § 6805. • In December 2021, the FTC amended the Safeguards Rule to keep pace with current technology.
Source: https://www.ftc.gov/business-guidance/resources/ftc-safeguards-rule-what-your-business-needs-know
Regulations & Guidance – Non-Depository Section 314.4 of the Safeguards Rule identifies 9 elements that a company’s ISP must include: • Designate a qualified individual to implement & supervise the InfoSec program • Conduct a risk assessment • Design & implement safeguards to control risk identified by the risk assessment • Regularly monitor & test the effectiveness of those controls • Train staff
• Monitor Service Providers • Keep the program current • Create a written Incident Response Plan • Require the qualified individual to report to the Board
Examination Approach Examples: Depository Institutions
Type of Entity
IT Exam Approaches/Rating Systems
Banks
Information Technology Risk Examination (InTREx); UFIRS/CAMELS, FFIEC Uniform Rating System for IT (URSIT); CAMEL, where “M” includes a review of information systems
Credit Unions
Trust Companies
FFIEC Uniform Interagency Trust Rating System (UITRS)
Foreign Banking Organizations & Bank Holding Companies
FRB, States; ROCA Rating System – where “O” is operational controls
Examination Approach Examples: Non-Depository Institutions
Type of Entity
IT Exam Approaches/Rating Systems
Mortgage Originators and Servicers
FFIEC Uniform Interagency Consumer Compliance Rating System (CC Rating System)
Money Service Businesses / Money Transmitters
CSBS Non-Bank Cybersecurity Exam Program; MTRA Workprogram (multi-state exams); FILMS rating system
Regulations & Guidance
Good reference, but remember the booklet does not specifically apply to FIs not regulated by the FFIEC FFIEC IT Booklet Handbooks:
Your Turn!
Tell us about the exam approaches and/or the rating systems you use regularly.
Do you like using one approach more than the other? If so, please explain briefly?
IT Examination Work Programs
Components of CSBS Nonbank Cyber Exam Programs Pre-Examination Resources Work Programs
Baseline Nonbank Workprogram
Exam Notification Letter
Enhanced Nonbank Workprogram
Pre-Exam Document Request List (DRL)
Pre-Exam Document Request List
Used for the Baseline Nonbank Cybersecurity Exam Program (V1.0) and the Enhanced Nonbank Cybersecurity Exam Program (V1.0)
Covers 15 Different Program Areas and defines specific documents to be provided
Includes space for State specific requests
Nonbank Cybersecurity Exam Programs Baseline
Enhanced • More comprehensive, for larger and more complex institutions • Includes all baseline questions (light blue shading) plus additional questions in areas requiring a deeper dive • Targeted for use by examiners with more specialized knowledge of IT & Cyber
• Based on the pilot program released in December 2020 • Covers same content as pilot in a streamlined version (based on 2021 examiner feedback) • Easier to use and half the questions with no loss of coverage • Covers 4 URSIT component areas
Note: The Baseline and Enhanced Nonbank Cybersecurity Exam Programs were added to SES and are available for mortgage origination, mortgage servicing, and consumer finance exams.
Baseline Nonbank Cybersecurity Exam Program
Source: https://www.csbs.org/sites/default/files/2022-08/Baseline%20Nonbank%20Exam%20Program%20V1.0.pdf
Enhanced Nonbank Cybersecurity Exam Program
Source: https://www.csbs.org/sites/default/files/2022-08/Enhanced%20Nonbank%20Exam%20Program%20V1.0.pdf
Components of InTREx ITP
Work Program
Information Technology Profile
Core Modules
Risk Profile
Expanded Modules
Qualitative Adjustment
Supplemental Workprograms
InTREx Workprogram Core Modules
Support & Delivery
Audit
Management • Risk Assessment • Vendor Management (Ongoing) • Information Security Standards (GLBA) • ID Theft Red Flags
Development & Acquisition • Vendor Management (Acquisition)
• BCP • Information Security • Operations • Incident Response • Network Security (IDS, Firewall) • EFT/E-Banking
InTREx Framework
Based on URSIT components
ED Module concept used for each component
ED Module core decision factors were derived from URSIT assessment factors
InTREx Features Incorporates baseline cybersecurity into procedures Requires conclusion on cybersecurity preparedness Requires conclusion on GLBA Information Security Standards (Part 364 Appendix B) Enhances focus on transaction/control testing
Allows for tracking of deficiencies noted in any decision factor
InTREx Procedures Core Modules Audit, Management, D&A, S&D • All procedures must be completed, but not all bullets need to be addressed • Do have flexibility to scope down, just not scope out
InTREx Procedures
Cybersecurity Workpaper • No stand-alone workprogram • Applicable procedures are marked with • Requires summary comment
InTREx Procedures
Information Security Standards (GLBA) Workpaper • No stand-alone workprogram • Applicable procedures are marked with • Requires summary comment
InTREx Additional Procedures Expanded Modules • Available for Management and S&D • Provide additional procedures for IT products/ services not covered in Core or that may need additional analysis
InTREx Additional Procedures Supplemental Workprograms (ED Modules/FFIEC IT Handbook) • ED Modules available for a variety of areas (EFT, Mobile Banking, Merchant Acquiring, etc.) • FFIEC IT Handbook provides in-depth procedures • FDIC Risk Advisories and Technical Examination Aids provide guidance • Should be completed to assess specific products not covered in the Core or Expanded Modules, or areas of higher complexity that require more in-depth review
InTREx Control Testing
Control Tests • Core Modules identify potential control tests • Control tests are marked with • Use discretion in determining which tests to perform • Not all control tests need to be performed, and conversely, examiners can do own control tests
InTREx Control Testing
Control Tests • If a control test was performed, the results should be noted in the comments to that procedure • May leverage control testing performed by internal and external auditors • Sufficient testing should be performed to validate the effectiveness of controls
Audit
Objectives
Provide tools to assess the effectiveness of the IT Audit Program
IT Audit Component Rating
Types of IT Audits/Reviews
IT Auditor Expertise
IT Audit Scope
Audit/Independent Review
Performed by independent personnel
Documented Findings/ recommendations
Knowledgeable individuals conduct
Risk assessment/ complexity based
IT scope & frequency based on inherent or residual risks
Conducted separately or all at once
Board/Committee reported results
Assessment Areas for IT Audits
• Audit risk assessment, plan and scope • Appropriate coverage of the entity’s IT environment and activities • Quality of written IT reports • Audit independence • Auditor qualifications • Findings and recommendations reporting and follow-up
The IT Audit program should be assessed for the following:
Guidance for IT Audit FFIEC IT Examination Audit Handbook
Federal Agency Rules and Regulations Interagency Policy Statement on the Internal Audit Function and its Outsourcing Interagency Policy Statement on External Auditing Program of Banks and Savings Associations Interagency Guidelines Establishing Information Security Standards (GLBA) Information Systems Audits and Control Association (ISACA)
IT Audit Engagement
Engaged & signed by an individual or committee not responsible for IT operations (preferably signed by a member of the Board or Audit Committee) The scope, timeframes, and cost of work to be performed
Expectations and responsibilities
Institution access to audit workpapers
IT Audit Risk Assessment
Universe of auditable entities
Risk assessment = audits
Reasonable scale
Relevance of controls
Effectiveness of Controls
Inherent risk
The only scale where cyber risk should be rated second lowest
IT Audit Scope
Identifies areas to be reviewed consistent with risk assessment/ risk level
Describes how the audit will be performed and tools to be used
Provides the timeframe for completing the audit
Firms may provide engagement letter specifying this information including costs
Example – Risk Assessment ≠ Audit Scope
Risk Assessment / Audit Schedule
• Network Penetration and Vulnerability Assessment • Wire Transfer Audit • Internet Banking/Social Media Audit • IT Audit • Vendor Management Audit
List of IT Audits
Scope from IT Audit
IT Audit Coverage
IT General Controls
Information Security Program (GLBA)
EFT (ACH/Wires/RDC)
NACHA Compliance
Penetration Testing/ Vulnerability Assessment
Identity Theft Red Flags Program
Regulation GG/Unlawful Internet Gambling Enforcement Act
IT Audit Coverage
Business Continuity Planning
Change/Patch Management
Vendor Management
Cybersecurity
Management
Internet/ Online Banking Network
Third-Party Outsourcing
Disaster Recovery
Strategic Planning
Project Management
Architecture (Firewalls & IDS/IPS)
BIA
Incident Response
GLBA Compliance
Social Engineering
Red Flags/ ID Theft Prevention
Security Monitoring
Written IT Audit Reports
Describe scope & objectives
Identifies deficiencies/ weaknesses
Suggests corrective action(s)
Management’s response/timing for corrective action(s)
Provides information on prior audit findings
• Identifies repeat findings
Complies with audit plan & schedule
Types of IT Audits
Internal Audits/ Certifications
IT General Controls
Penetration Tests
Vulnerability Assessments
Statement on Standards for Attestation Engagements (SSAE-16/18)
IT General Controls (ITGC)
• Logical access controls over infrastructure, applications, and data • System development life cycle controls • Program change management controls • Data center physical controls • System and data back-up & recovery controls • Computer operation controls
ITGC:
ITGCs should be performed annually
Wire Transfer/ACH Audits These services are critical to many financial entities
• Particularly in small to medium community banks, CUs, and MTs Usually included in with ITGC audit • Could occur in financial entities with significant wire/ACH activity • Usually in large community financial entities Can be a separate audit
Vulnerability Assessment vs Penetration Tests High-level comparison: • Vulnerability Assessments identify where facilities or networks are at risk • Penetration Tests subject network(s) to “real life” cyber events internally and externally Both should be performed, at least annually.
Vulnerability Assessments
• Requires specific skills/knowledge • Audit team tries to find weak points • Tools used simulate a variety of attacks • Results are used in Penetration Testing for potential exploitation Testing: • Checking building windows and doors to see if they are secured • Checking if building is susceptible to other events, e.g. natural catastrophes Basic Vulnerability Assessment description:
Vulnerability Assessment vs. Risk Assessment
Assist in mitigating or eliminating vulnerabilities for key resources
Assigning quantifiable value and importance to a resource
Identifying the vulnerability or potential threat(s) to each resource
Cataloging assets and capabilities (resources) in a system
FI will sometimes use vulnerability assessment to aid in completing the risk assessment process
Penetration Test (Pen Test)
Pen Test “tests” systems to find & exploit known vulnerabilities that an attacker could exploit
Determine if there are
Pen Test report will describe any weaknesses as “high”, “medium” or “low”
Require management’s knowledge & consent
Require a high degree of skill to perform
weaknesses and if able to access system functionality and data
Are intrusive as actual “attack” tools are used
Pen Test Strategies
Targeted Testing
External Testing
Internal Testing
mimics an insider attack by an authorized user with standard access privileges (what can happen with a disgruntled employee)
targets externally visible servers or devices (seen by anybody on Internet) to see if they can get into internal systems and how far
performed by the entity’s IT team and external testing team
Pen Test Value Ascertain the likelihood of gaining system access
Detecting vulnerabilities not easily found using standard system protective means Ability of current security methods to detect or repel an attack
Likelihood of exploiting a low-risk vulnerability to gain higher level access
List of vulnerabilities needing patching
Measure of risk for a cyber attack
Additional efforts needed to protect the network(s)/ system(s)
External Technology Service Provider (TSP) Reports
• FFIEC TSP Reports • Public/open section that is available to FI clients • Confidential section is available to regulatory agencies • Service Organization Control (SOC) Reports • AICPA standard for reviews of service providers • A type of control assessment provided to a service providers clients
FFIEC TSP Reports
SOC Reports SSAE 18 SSAE 16 (2011-2016) SAS 70 (pre-2011)
Service Organization Control (SOC) Reports
• SOC I • Focus on internal controls over financial reporting (ICFR) • This is the client’s financial reporting • SOC II • Auditor review of internal controls related to: • Security, Availability, Processing, Integrity, Confidentiality, Privacy • Service provider gets to choose the scope of the review • SOC III • Includes a description of the system and the auditor’s opinion • Most abstract, does not include the results of testing
Three Levels of Service Organization Control (SOC) Reports:
Service Organization Control (SOC) Reports
• Type I • Describes the servicer’s descriptions of controls at a specific point in time • Auditor performs no testing of servicer’s controls attesting to controls based on servicer’s account of controls- no opinion • Type II (preferred) • Includes information from a Type I Report • Detailed testing of the servicer’s controls over a minimum consecutive six-month period • Auditor expresses an opinion based on their testing
Two types of Service Organization Control (SOC) Reports:
Audit Reporting/Follow-up
Similar to Safety & Soundness:
o IT Audit reporting channels What is being reported and to whom o Senior Management Responses Are they reasonable and corrective timeframe is appropriate o Exception Tracking Show all IT audit findings, both Internal and External, and regulatory along with corrective action(s)
Auditor Independence & Qualifications Independence : Whether or not there are conflicting duties, e.g., involved in auditing areas they have responsibilities or oversight Auditor should be reporting to Board or Audit Committee Whether or not the Auditor has a debt with the entity (may have some influence)
Type of IT experience and training • Some IT audits require specific skill sets
Current IT certifications the auditor maintains
List of references from entities with similar IT activities
Qualifications :
These qualifications provide some assurances, but don’t guarantee a quality audit
IT Audit Review
• Audit scope and objectives • Pertinent areas for improvement based on results of testing • Reasonable and appropriate recommendations • Findings and observations consistent with your examination results
Audit Reports include:
Audit Report Review
• Be wary of auditors who rely solely on checklists • Using only regulatory workprograms is not an audit • Absence or lack of workpapers could indicate a poorly performed audit Especially if there are no workpapers showing how ITGCs were reviewed/tested
Signs of a questionable audit:
Audit Findings Tracking & Resolution
A formal tracking system that assigns responsibility and target date for resolution
Timely and formal status reporting
Tracking and reporting of changes in target dates or proposed corrective actions to the Board or Audit Committee
Process to ensure findings are resolved
Independent validation to assess the effectiveness of corrective measures
Issues & corrective actions from internal audits and independent testing/assessments are formally tracked to ensure procedures and control lapses are resolved in a timely manner.
Auditor Interview Areas to focus on with auditor interview: • Knowledge of the IT environment and risks • Understanding of systems they are reviewing • Understanding of the basic controls (of these systems) • Verify training and/or certifications (as necessary)- certifications require specific training and number of hours/year (usually 40) • Why auditor used a checklist or FFIEC IT work-program and audit work didn’t fit entity’s activity
InTREx - Audit
InTREx – Audit
Audit Component Rating Areas to focus on when rating IT Audit component adequacy:
• Independence and quality of oversight • Audit risk analysis methodology/resources applied • Scope, frequency, accuracy, and timeliness of audit reports • Extent of audit participation in SDLC to ensure effectiveness internal controls and audit trails • Audit plan in providing appropriate coverage of IT risks • IT auditor’s adherence to code of ethics/professional standards • Qualifications of IT auditors • Timely and formal follow-up and reporting on management’s resolution of identified issues/weaknesses • Quality and effectiveness of internal and external audit activity related to IT controls
Conclusion
Learned basics for IT Audits
Minimum scope in risk focused examination process must review the entity’s audit program
If audit program is deficient or lacking • Don’t need to dig deeper • Describe the deficiencies & record in your WP • Notify the Safety & Soundness EIC If audit program is satisfactory • Can risk focus areas recently audited
Summary • Audits are a necessity whether performed by in-house and/or external resources • Must be performed by independent and qualified individuals/companies • Based on a current risk assessment • Must provide written, detailed, stand-alone reports • Results must be reported to the Board’s Audit Committee or a related Board Committee in a timely manner • Audits can aid in exam scope reduction
Internal Use Only
Risk Assessment
Internal Use Only
Risk Assessment Overview • Purpose • Risk Appetite
• Risk Identification • Risk Assessment • Risk Response • Risk Monitoring
Internal Use Only
Why have a Risk Assessment? Helps organizations identify inherent business risks and provide measures, processes and controls to reduce the impact of these risks to business operations • Without a Risk Assessment: • Not in compliance with GLBA (Appendix B of Part 364 of the FDIC Rules and Regulations) • Protection of information assets are not aligned with business objectives or regulatory requirements • Loss (or compromise) of critical information can be catastrophic • Loss of trust between a financial institution and its customers • Harms the safety and soundness of institution
Internal Use Only
Information Security “CIA TRIAD”
• Confidentiality. Only authorized entities, have access to the data. • Integrity. There are no unauthorized modifications of the data. • Availability. Authorized entities can access the data when and how they are permitted to do so.
Internal Use Only
IT & Cyber Risk are Business Risks • IT can provide significant benefits to an enterprise, but it also involves risk • IT provides value to enterprise • IT-related events could potentially impact the business • IT creates challenges in meeting strategic goals and objectives and uncertainty in the pursuit of opportunities • IT goals must align with business goals and objectives (Grow, Run, Change) • IT/Cyber risk is operational risk and should be treated like other key business risks • Other Operational Risks are people, process, external events, legal & compliance • Many executives tend to relegate IT risk to technical specialists outside the boardroom • Transfer responsibility
Internal Use Only
Risk Governance
Board of Directors
Risk Appetite
Senior Management
Risk Reporting
Risk Reporting
Risk Management
Business Units
Risk Guidance
Risk Monitoring
Business Operations & Processes
Internal Use Only
Risk Appetite
Risk appetite is the amount of risk, on a broad level, an organization is willing to accept in pursuit of its mission.
How much risk is an organization willing to accept to achieve its objectives?
Risk appetite is not just a part of risk and risk management discussions, it is a key component in strategic planning and day-to-day decision making.
Internal Use Only
Cycle of IT Governance
Test and Update: • Policies • Procedures • Controls
Identify and prioritize gaps: • Policies • Procedures • Controls
Risk Assessment: • Assets • Threats • Vulnerabilities • Mitigating controls
Internal Use Only
Risk Assessment Types & Methodologies
Internal Use Only
Risk Assessments Process used to identify and understand risks to the confidentiality, integrity, and availability of information and systems. Consists of the identification and valuation of assets and an analysis of those assets in relation to potential threats and vulnerabilities, resulting in a ranking of risks to mitigate. Results are used to develop strategies to mitigate those risks.
Internal Use Only
Types of Risk Assessments
Gramm-Leach-Bliley Act (GLBA) / Information Security
Business Continuity Planning
Audit
Authentication
Encryption, Awareness Training, etc.
Automated Clearing House (ACH)
Cybersecurity
Third Parties
Internal Use Only
Risk Assessment Methodologies
Quantitative
Qualitative
• Based on Judgment • Simple to implement • Flexible, cover all business risks • Quick to identify risks • Subjective/Bias • Delphi technique/expert opinions • Decision trees • Probability/Consequence • Relies on organizational expertise
•Data Driven! •Objective and accurate •Realistic and measurable •Requires data for analysis •More complex = more time •Data can be difficult to collect
Internal Use Only
Risk Assessment Process & Walkthrough
Internal Use Only
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Identifying Assets Electronic (Network maps, hardware/software, systems, databases, computers, media) Paper-Based (Policies, reports, contracts, financial records)
Outsourcing arrangements Cloud computing
Internal Use Only
Examples of Assets to be Protected
People • Expertise, corporate memory
Hardware • CPU, routers, drives
Software • OS, applications, source code
Data • Database, files, email, backups
Documentation • Loan & deposit documents • Disclosures • Signature cards
Third Parties • Processors • Aggregators
Cloud • AWS • Salesforce • Jira
Internal Use Only
Identifying Asset Sensitivity
Once the assets are identified, their criticality & sensitivity must be valued
It is critical to differentiate the importance of assets so that institutions can assign priorities & appropriate controls
It is the firm’s responsibility to provide definitions for the classifications they use in their risk assessment
Management should be able to define all terms used in the risk assessment
Internal Use Only
Example Bank Topology
Internal Use Only
Risk Assessment: Identification & Valuation
Internal Use Only
Risk Assessment: Identification & Valuation
• Institutions may value assets in a variety of ways. • Asset’s replacement value • Revenue loss • Reputation • Sensitivity of the data, etc. • No right or wrong way, but it makes sense and retain an internal consistency.
Internal Use Only
Risk Assessment Process
Identify and value Information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Threats, Vulnerabilities, and Risks
Vulnerability
Risk
Threat
• Any circumstance or event with the potential to adversely impact organizational operations
• Hardware, firmware, or software flaw that leaves an information system open to potential exploitation • Weakness in automated procedures, controls, layout, etc., that could be exploited to gain unauthorized access or disrupt processing
• Level of impact on operations, assets, or individuals given the potential impact of a threat and the likelihood of that threat occurring
Internal Use Only
Types of Threats
Internal Use Only
What are you afraid of?
• Ransomware • Configuration errors • Spear Phishing
• Website Defacement • Social Engineering • Remote access risks • Bring Your Own Device • Third Parties • Employees “insider threats” • Regulators
Internal Use Only
Risk Assessment: Threats & Vulnerability & Risk
Internal Use Only
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Weighing Threats
• Institutions may choose between • Qualitative Assessment • Quantitative Assessment • Combination of both, but Qualitative
• Management may place more weight on one type of threat than another.
• When reviewing the institution's risk values, interact with management if something does not make sense.
Internal Use Only
Risk Assessment: Weighing Threats
Internal Use Only
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Risk Assessment: Risk Response
Internal Use Only
Risk Mitigation is Not Risk Elimination!
• Impossible to eliminate threats 100%
• Risk response is to reduce the impact or consequence of the vulnerability
• Exposure is in line with Risk Appetite
• Board aware and agree to the outcomes
One needs a process to ensure you are implementing countermeasures that actually limit risk.
Internal Use Only
Risk Assessment Process
Identify and value information assets
Identify potential internal/external threats and/or vulnerabilities
Assess likelihood & impact of threats/vulnerabilities
Risk Response (Accept, Transfer, Reduce, Ignore)
Assess sufficiency of risk control policies, procedures, information systems, etc.
Internal Use Only
Risk Assessment: Control Testing
Internal Use Only
Risk Assessment: Control Testing • Assurance testing or self-assessments on controls if documented, demonstrates risk monitoring. • Metrics reporting provides evidence of conformance with policies and procedures. • Independent review to test controls reduce bias, increase capabilities, and increase knowledge about threats and technologies. • Independence gives credibility to the test results. • The reports generated from the tests should be prepared by individuals who similarly are independent.
Internal Use Only
Risk Assessment Review & Key Points
• Purpose • Risks • Risk Appetite
• Risk management • Risk Assessment
Internal Use Only
Risk Assessment Review
The risk assessment must identify: • Information and technology assets of the organization • Assess likelihood and impact of threats & vulnerabilities (inherent risk) • Risk Response (Accept, Transfer, Reduce, Ignore) • Audit controls/provide assurance
Internal Use Only
Expanding the Depth of Review
Plan to expand the depth when: A risk assessment has not been reviewed at least annually. There have been changes in management and/or environment.
Risks identified do not incorporate Technical, Human, Environmental risks. The risk assessment has been completed with limited input from other departments. There are discrepancies between the services/ topology and assets identified in the risk assessment. Significant audit and independent review findings are evident. You are not confident in management's responses.
Internal Use Only
Reducing the Depth of Review May be able to significantly reduce the depth of the risk assessment review when: The risk assessment was recently reviewed by a qualified auditor and found to be adequate. There have been no changes in management or the environment since the last examination. The quality of the risk assessment process has been validated.
Internal Use Only
Risk Assessment: Management Responsibilities Effective risk assessments are done by qualified personnel, have executive-level ownership & are enterprise-wide. Risk assessments should be done annually or when significant changes occur. An effective risk assessment process includes identification of assets, threats & vulnerabilities. Management should be able to explain rationale for security devices they use and for not including devices that would further mitigate risk.
Internal Use Only
Risk Assessment: Board Responsibilities The Board is responsible for communicating their risk tolerance to management. Board should review and approve the risk assessment annually. Risk decisions (acceptance/exceptions) should be made at the Board and/or executive management level and be documented. Board minutes should support for answers provided by management during discussions (approval/discussion of risk assessment findings, risk acceptance decisions, etc.).
Internal Use Only
Development and Acquisition
Module Objectives • Analyze an institution's project management process. • Understand the aspects of the development, acquisition, and maintenance activities. • Assess management’s ability to effectively deploy appropriate technology solutions from initial contract to end of life (EOL). • Identify weaknesses and draw meaningful conclusions about an institution's process and practices.
System Development Life Cycle • A project management technique that divides complex projects into smaller, more easily managed segments or phases.
• Segmenting projects allows managers to verify the successful completion of project phases before allocating resources to subsequent phases. • SDLC can be conveyed in 5-6-7 phases. • Phases may be divided differently depending on the organization involved.
SDLC: The glue that holds Development & Acquisition together SDLC Framework
Project Management Process
Development In-house
Acquisition
Third Party
SDLC: The glue that holds Development & Acquisition together
• Initiation
• Planning & Analysis
• Initiation
1
1
1
• Planning
• Design
2
• Planning
2
2
• Design
• Development
3
• Execution
3
3
• Development
4
• Testing
4
• Monitoring
4
• Testing
5
• Deployment
5
• Closing
• Implementation
5
6
• Maintenance
6
• Maintenance
7
SDLC: The glue that holds Development & Acquisition together
Initiation
Planning
Design
Develop
Test
Implement
Maintenance
• Key tasks in initiation & planning include: – Begins when an opportunity to add, improve or correct a system is requested. A business need is identified (requires stakeholder involvement) – Feasibility study outlines scope, cost/benefit, functional requirements, Project factors. – Creation of Project Plan that refines initiation phases further identifying specific activities for the project. – Creation of Business Requirements Document – Key areas include Project Overview, Requirements, Roles and Responsibilities, Communication, Management, Budget, Testing, Deliverables.
SDLC: The glue that holds Development & Acquisition together
Initiation
Planning
Design
Develop
Test
Implement
Maintenance
• Key tasks in design & develop include: – Begins converting informational, functional, and network requirements into design that programmers can use to script an application. – Design document focuses on how to deliver the required functionality based on business requirements document (BRD). – Development starts when stakeholders agree on design, converting design specifications into an executable program. – Development includes, acquiring and installing system environment, databases, test case procedures, and coding.
SDLC: The glue that holds Development & Acquisition together
Initiation
Planning
Design
Develop
Test
Implement
Maintenance
• Key tasks in test & implement include: – Testing phase should test to ensure accuracy of programmed code, inclusion of expected functionality, and interoperability with other applications and network components. – Good Project management practices will have test plans & test environment prior to development – Various testing methodologies include acceptance testing, functional, integration, stress testing. – Implementation involves approving, installing or moving test code into production. (Separation of duties is key) .
SDLC: The glue that holds Development & Acquisition together
Initiation
Planning
Design
Develop
Test
Implement
Maintenance
• Key tasks in maintenance include: – Configuration Management with baselines versions or “gold image” of approved application or system. – Change Management documented procedures for ensuring all changes are approved and documented. – Procedures for Upgrades, patches, security fixes and emergency updates. – Decommissioning and End-of-Life.
Project Management
Project Management • Project management is simply planning and completing a task which includes one-time or ongoing operational activities. • Project Management practices are formalized. • Characteristics of a project management include: • Roles and Responsibilities • Project Plans • Standards & Procedures
Roles and Responsibilities Responsibilities Key Roles
Board of Directors (BoD)
Approve funding (major projects) and should understand project plans and monitor progress against plan. Set risk tolerance levels within which the project manager must operate. Establish and approve major project deliverables and coordinate activities. The committees often include the project manager, a board member, and executives from all organizational departments. Approve & promote projects within their authority and ensuring adequate resources are available to complete projects. Ensuring projects support business objectives, project goals and expectations are clearly defined, and project tasks are identified, scheduled, and completed. Project managers are also responsible for monitoring and reporting a project's status to senior management. Maintaining the technology resources used by project teams and assisting in the testing and implementation phases. User departments assist in defining and testing functional requirements (system features). End-user involvement throughout a project is critical to ensuring accurate definitions and adequate tests. Identify and design security requirements and testing the features during development and after implementation. Validate project assumptions and ensure the quality of deliverables. Assurance personnel should be independent of the development process and use predefined standards and procedures. Identify system control requirements and testing the controls during development and after implementation.
Technology Steering Committee Senior Management Project Manager (PMO)
Technology Department
User Departments
Information Security Quality Assurance
Auditors
Project Plans • Project plans are detailed with clearly defined expectations, realistic budgets, and communication structure ensures the organization's ability to manage projects successfully. • Boards, or board-designated committees, should formally approve project methodologies, and management should approve and document significant deviations from approved procedures. • Project Plans must be carefully managed to ensure they meet organizational needs on time and within budget. • Ineffectively managed projects often result in late deliveries, cost overruns, or poor-quality applications. • Regardless of the SDLC method used, it should be tailored to match a project's characteristics and risks.
Project Standards
Organizations should establish appropriate methodologies that govern project management activities:
• Configuration Management • Quality assurance • Risk management • Testing • Documentation
Project Management Tools
Management (PMs) should have appropriate tools to schedule and monitor project tasks and estimate project costs and completion dates.
• Project Trackers • Gannt Charts • Kanban (Agile tool) • Collaborative Software
Examiners should verify accuracy of trackers, charts and diagrams to assess the effectiveness of project management tools.
Project Management Process
Initiation
Planning
Execution
Monitoring
Closing
• Scope & Budget • Business Requirements Document • Work Breakdown Schedule • Gantt Chart
• Deployment • Upgrades • Infrastructure
• Tracking & Status • KPIs • Technology Steering Committee • BoD Reporting • Scope Creep
•Conclude activities •Policy & Procedures • Independent Review •BCP & DR Testing
• Business Need • Feasibility Study • Project Plan • Risk assessment
• Test Environment • Quality Assurance • Change requests • Updates to plan
Information Security & Audit
Project Management Communications Adequate level of oversight and support provided by management & the board relating to development, acquisition, and maintenance activities.
• Policies establish committee and Board reporting requirements. • Risk reporting and monitoring procedures. • Examiners need to determine the frequency and quality of technology related reporting to committees and board are satisfactory.
Development
What is Development? • Development projects involve the creation of software applications or integrated application systems. • May include “internally developed” scripts or spreadsheets and database reports for cases where organization rely on the spreadsheets and reports to make important budgeting and accounting decisions. • Software development projects can be completed in-house, through outsourcing, or by a combined approach. • Organizations typically manage development projects using systematic methodologies that divide large, complex tasks into smaller, more easily managed segments or phases (SDLC).
Development Standards
• Project management standards should address issues such as project management methodologies, risk management procedures, and project approval authorities. • Roles & responsibilities that establish SoD Separation of duties within the development team controls for “test” and “production” environments. • System control standards should address items such as an application's functional, security, and automated control features. Organizations should have written development standards that, at a minimum, address project management, roles and responsibilities, system control, change control, testing and documentation.
Made with FlippingBook - Share PDF online