Baseline Nonbank Cybersecurity Exam Program

This is the student handbook for the May 19-June 23, 2021 CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program held virtually.

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program

May 19-June 23 , 2021

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program May 19, 2021

Teams Features

2

CSBS Virtual Discussion Series

• Session 1 of 5  ‐ Document Request List (Today) • Session 2 of 5 – IT Audit, Development Activities & Network/Application Security and Administration • Session 3 of 5 – Network/Application Security and Administration (continued) • Session 4 of 5 – IT Oversight and Supervision • Session 5 of 5 – Business Continuity/Disaster Recovery Planning

3

Speaker Information

Director of Cybersecurity/IT/FinTech MA Division of Banks Holly.Chase@mass.gov Holly Chase

Speaker Information

Cybersecurity Risk Specialist TX Department of Banking Linda.Pearson@dob.texas.gov Linda Pearson

Document Request List

6

Information Security Program – IT-1

a) All policies and procedures that comprise the information security program, including but not limited to: Information Security; Anti ‐ virus; Change Management; Software Development and Maintenance; Vendor Management; Business Continuity/Disaster Recovery/Emergency Preparedness/Incident Response Plans; Remote Access for Employees and Customers; Data Backups; Data Retention; Data Disposal; Acceptable Use; Rules of Behavior; Clean Desk; Encryption/Data at Rest and Data in Motion; Mobile Device Management, including Bring Your Own Device; and Written hardware and software end ‐ of ‐ life policies and procedures

7

Information Security Program – IT-1 (continued)

b) Risk assessment(s) c) Information Security training materials for all employees, including employee completion records

8

Board/ Management Oversight – IT-2 a) IT Strategic Plan/Budget b) Most recent CIO or CISO presentation

c) Materials to support Board discussion of risk acceptance d) Board/committee minutes to support designation of employee(s) to coordinate the information security program

9

IT/IS Organization – IT-3

a) IT/IS Organizational Chart(s) b) Resumes for key IT personnel c) Job descriptions for key IT personnel d) IT Succession Plan (if separate from overall institution plan)

10

Relationships Between Assets and Data Flow – IT-4

a) Network Diagram(s) b) Data Flow Diagram(s) c) Inventory of approved hardware and software assets, including network monitoring tools

11

Vulnerability Management Program – IT-5

a) Written policies and procedures, if not already provided for #1 above b) Vulnerability scans – most recent c) Penetration tests/vulnerability assessments – most recent d) Remediation Actions

12

Patch Management Program – IT-6

a) Written policies and procedures, if not already provided for #1 above b) Patch deployment confirmation c) Rollback settings

13

Change Management Program – IT-7 (includes software development activities)

a) Written policies and procedures, if not already provided for #1 above b) List of software development, acquisition, and maintenance changes within past 12 months c) List of hardware acquisition and maintenance changes within past 12 months

14

IT Audit Function – IT-8

a) IT Audit Policy b) Current and previous IT audit schedule c) IT audit risk assessment and audit plan d) IT audit reports for the past 24 months, including the corresponding engagement letters, if applicable e) Actions taken to remediate findings f) IT audit and regulatory finding tracking list

15

Vendor Management Program – IT-9

a) Written policies and procedures, if not already provided for #1 above b) List of third ‐ party vendors, indicating which vendors are considered critical c) Documentation supporting compliance with vendor management program such as audit reports, contracts, due diligence, financial statement reviews, etc. (a sample will be selected upon receipt of the third ‐ party vendor list)

16

Incident Response – IT-10

a) Incident Response Plan, if not already provided for #1 above b) Documentation to support most recent incident response plan test c) List of incidents occurring within previous 12 months

17

Business Continuity/ Disaster Recovery/ Emergency Management – IT-11 a) Business Continuity/Disaster Recovery/ Emergency Management Plans, if not already provided for #1 above b) Backup policies and procedures, if not already provided for #1 above c) Business Impact Analysis

18

Business Continuity/ Disaster Recovery/ Emergency Management – IT-11 (continued) d) Risk Assessment e) Documentation to support all testing performed during previous 24 months

19

Password Management – IT-12 a) Password settings for all systems b) Screen lockout settings for all systems c) Session expiration settings for all settings

20

Remote Access for Employees & Customers – IT-13 a) Written policies and procedures, if not already provided for #1 above b) Description of who all has remote access, including third ‐ parties, employees and board members with company ‐ owned devices and employees and board members with personal devices

21

Insurance policies (if applicable) – IT-14 a) Cybersecurity, ransomware, data breach notification

22

Products and Services – IT-15

Describe the technology environment: a) Describe all cloud services used by the institution. Include Software as a Service (SaaS), Infrastructure as a Service (IaaS), and Platform as a Service (PaaS).

23

Products and Services – IT-15 (continued)

b) List of all core applications, including online applications and network(s), and indicate whether the applications are outsourced or hosted in ‐ house. • If outsourced, please provide the name and location of the third ‐ party provider. • If in ‐ house, please indicate whether the applications are developed and maintained in ‐ house or are a third ‐ party software product. • Include the product name and third ‐ party provider name and location for software products.

24

Products and Services – IT-15 (continued)

c) Describe processes for network monitoring (e.g., performance, intrusion detection, web filtering) and network operations. Include whether these activities are outsourced or performed in house.

25

Questions?

26

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program June 2, 2021

Teams Features

2

CSBS Virtual Discussion Series

• Session 1 of 5  ‐ Document Request List • Session 2 of 5 – IT Audit, Development Activities & Network/Application Security and Administration (Today) • Session 3 of 5 – Network/Application Security and Administration (continued) • Session 4 of 5 – IT Oversight and Supervision • Session 5 of 5 – Business Continuity/Disaster Recovery Planning

3

Go to www.menti.com & use the code

Speaker Information

G. Henry Hallman, III

Financial Program Manager & Team Supervisor North Carolina Commissioner of Banks ghallman@nccob.gov

Speaker Information

Cybersecurity Risk Specialist TX Department of Banking Linda.Pearson@dob.texas.gov Linda Pearson

Speaker Information

Financial Institutions Manager California Department of Financial Protection & Innovation Matthew.Fujikawa@dfpi.ca.gov Matthew Fujikawa

IT Audit

8

Question 1

Is the scope and frequency of IT audits appropriate for the size and complexity of the institution? Are audit plans driven by the institution's risk assessment process?

9

Question 2

Does the institution have a process for tracking issues identified during testing, monitoring, and auditing and regulatory examinations? This includes assigning the action needed to correct the issue and recording when the issue is resolved, or the risk is accepted.

10

Development Activities

11

Question 3

If the Institution develops their own software, do they follow a documented Software Development Life Cycle and conduct security testing? Is a formal project management process followed?

12

Question 3 - continued

• Rely on audit results, if available • Contact experienced IT examiner, if that resource is available • Use the FFIEC Development and Acquisition booklet for guidance

13

Network/Application Security & Administration

14

Question 16

Are access controls sufficient for employees? Consider the following: • Length, complexity, expiration, and reuse requirements • Default/factory settings are changed • Screen lock after inactivity periods • Lockouts after incorrect login tries • Help desk procedures to deal with failed login attempts • Multi ‐ factor authentication • No shared accounts • Administrative privileges only assigned when needed

15

Question 17

Are appropriate access controls in place for consumer accounts and/or portals? Are the controls different from the access controls for employees?

16

Question 18

How does the institution determine who needs access to what data/information? Is user access limited to business need/least privilege? Are all user access levels, including administrators, monitored and reviewed regularly? How is unauthorized access detected?

17

Question 19

Is there an employee departure checklist, regardless of the reason the employee is leaving (including transitioning to a different position)? Are user accounts disabled for employees who have left the institution or changed job responsibilities?

18

Question 20

How is remote access managed for employees, board members, vendors, and customers? What measures does the institution take to provide remote access in a secure manner?

19

Question 21

What access controls are in place for customer accounts and/or portals? Are there different password requirements for employees vs. customers? Are customers required to use multifactor authentication? How many failed login attempts are permitted before a user must reset their password? Are requirements in place for the strength of passwords?

20

Question 22

If a vendor has access to the institution's network, does the IT staff monitor their access? Is access limited to business needs?

21

Question 28

Are vulnerability scans conducted? How often? By whom? What, exactly, is scanned?

22

Question 29

Are penetration tests conducted? How often? By whom? If the institution does internal development, do they perform application security testing?

23

Questions?

24

CSBS Virtual Discussion Series

Please join us for the next session on June 9 th !

Session 3 of 5 – Network/Application Security and Administration (continued)

25

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program June 9, 2021

Teams Features

2

CSBS Virtual Discussion Series

• Session 1 of 5  ‐ Document Request List • Session 2 of 5 – IT Audit, Development Activities & Network/Application Security and Administration • Session 3 of 5 – Network/Application Security and Administration Continued (Today) • Session 4 of 5 – IT Oversight and Supervision • Session 5 of 5 – Business Continuity/Disaster Recovery Planning

3

Speaker Information

IT Director Kansas Office of the State Bank Commissioner matt.hodges@osbckansas.org Matt Hodges

Speaker Information

Kylee Fine

Senior IT Examiner Kansas Office of the

State Bank Commissioner kylee.fine@osbckansas.org

Network/Application Security and Administration

6

Question 30

Is an Intrusion Detection/Prevention System in use (IDS/ IPS)? Who is responsible for reviewing/monitoring IDS/IPS event reports?

7

Question 31

Are controls in place to prevent individuals from conducting unauthorized electronic transmission?

8

Question 39

Does the institution maintain an inventory of all approved hardware and software assets? If yes, request a copy of the inventory list and verify it generally matches the topography diagram. Are documented security configuration standards maintained for all authorized operating systems and software?

9

Question 40

Does the institution have an up ‐ to ‐ date network topology (diagram) available for review? Are the following physical devices identified? • Locations of servers or clusters. If clusters or VM hosts are identified, do they specify the virtual machines associated with the host? • Security devices such as firewalls and IDS/IPS devices • Network connections to the internet • User devices, either individually or as a group • Devices or servers that provide key network services such as DNS and DHCP, or core applications • DMZ areas

10

Question 41

Are the following logical resources identified? • Where data is stored • VLANs • Cloud resources • VPN connections to service providers • Remote access entry points for users or vendors (VPN connections)

11

Question 42

Are end ‐ of ‐ life assets identified with an adequate replacement schedule?

12

Question 43

Does the institution have a firewall(s)? How is it monitored? Are firewall rules regularly reviewed?

13

Question 44

Is malicious code protection (e.g., anti ‐ virus) deployed on all workstations and servers?

14

Question 45

If so, how is it deployed, updated, and managed?

15

Question 46

What is the institution's process for applying security patches to organizational assets? Are patch status reports generated and independently reviewed to validate the effectiveness of the patch management program? Are automated systems used to identify and patch systems?

16

Question 47

Is encryption used to secure data at rest and/or in motion?

17

Question 48

Is employee user activity monitored (including vendors) in accordance with an Acceptable Use Policy?

18

Questions?

19

CSBS Virtual Discussion Series

Please join us for the next session on June 16 th !

Session 4 of 5 – IT Oversight and Supervision

20

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program June 16, 2021

Teams Features

2

CSBS Virtual Discussion Series

• Session 1 of 5  ‐ Document Request List • Session 2 of 5 – IT Audit, Development Activities & Network/Application Security and Administration • Session 3 of 5 – Network/Application Security and Administration (continued) • Session 4 of 5 – IT Oversight and Supervision (Today) • Session 5 of 5 – Business Continuity/Disaster Recovery Planning

3

Speaker Information

Director of Cybersecurity/IT/FinTech MA Division of Banks Holly.Chase@mass.gov Holly Chase

Speaker Information

Cybersecurity Risk Specialist TX Department of Banking Linda.Pearson@dob.texas.gov Linda Pearson

IT Oversight and Supervision

6

Question 4

How are resources allocated across the institution? What are the IT and information security budgets and where does the money primarily go?

7

Question 5

Does the institution have dedicated cybersecurity resources with appropriate job titles and areas of responsibility? Does management have a program to ensure employees are up to date with emerging issues and technologies?

8

Question 6

Is the institution's information security program formally documented and reasonably designed to accomplish the following objectives? (1) Ensure the security and confidentiality of customer information (2) Protect against any anticipated threats or hazards to the security or the integrity of such information (3) Protect against unauthorized access to or use of such information that could result in substantial harm or inconvenience to any customer.

9

Question 6 - continued

An Information Security Program is required by the Safeguards Rule (16 CFR 314.3): You shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to your size and complexity, the nature and scope of your activities, and the sensitivity of any customer information at issue. Such safeguards shall include the elements set forth in §314.4 and shall be reasonably designed to achieve the objectives of this part, as set forth in paragraph (b) of this section.

10

Question 6 - continued

Safeguards Rule, Section 314.4 Information Security Program Elements (16 CFR 314.4): • Designated Employee(s) • Risk Assessment • Key Control Testing • Vendor Management/Third Party Risk Program • Annual Program Adjustments

11

Question 7

Does the Information Security program designate an employee or employees to coordinate the information security program? If so, request their name and contact information.

12

Question 8

Are written policies and procedures in place for secure destruction and disposal of physical and electronic records of sensitive information?

13

Question 9

Is there a documented Risk Assessment process that includes inherent and residual risk identification?

• Asset Identification • Risk Identification

• Risk Assessment and Measurement: Analyze the risk (likelihood/impact on specific assets); should allow you to rank/measure risk (High, Medium, Low for impact and likelihood  ‐ and definitions should be provided) • Risk Mitigation: Identify and prioritize ways to reduce those risks; describe how identified risks will be mitigated or accepted • Risk Monitoring

14

Question 9 - continued

Per the Safeguards Rule (16 CFR 314.4(b)), a risk assessment should: Identify reasonably foreseeable internal and external risks to the security, confidentiality, and integrity of customer information that could result in the unauthorized disclosure, misuse, alteration, destruction or other compromise of such information, and assess the sufficiency of any safeguards in place to control these risks. At a minimum, such a risk assessment should include consideration of risks in each relevant area of your operations, including: (1) Employee training and management; (2) Information systems, including network and software design, as well as information processing, storage, transmission and disposal; and (3) Detecting, preventing and responding to attacks, intrusions, or other systems failures.

15

Question 10

Are key IT controls identified during the risk assessment process regularly tested or monitored? Does the institution engage a third party or internal resources to measure their effectiveness?

16

Question 11

Does the institution have an up ‐ to ‐ date data flow diagram that shows the flow and storage of PII data, throughout its lifecycle?

17

Question 12

Is information security awareness training provided to all employees (including managers, senior executives, and contractors) as part of initial training for new users and annually thereafter?

18

Question 13

How does the institution make sure it employs trustworthy third parties? Does the institution perform due diligence before entering into a contract? Is there an active vendor management program and/or methodology?

19

Question 14

Are contracts in place? Do vendor contracts require service providers to implement and maintain appropriate information security safeguards? Consider the confidentiality, availability, and integrity of information stored with the vendor. Does the vendor management program include specified contract deliverables, due dates, and service level agreements? Are vendors monitored on an ongoing basis? (not just at hire/selection)? Does it define each party's information security responsibilities under the contract?

20

Question 15

Is a cloud provider used and if so, are they part of the vendor management program?

21

Questions?

22

CSBS Virtual Discussion Series

Please join us for the final session on June 23 rd !

Session 5 of 5 – Business Continuity/Disaster Recovery Planning

23

CSBS Virtual Discussion Series - Baseline Nonbank Cybersecurity Exam Program June 23, 2021

Teams Features

2

CSBS Virtual Discussion Series

• Session 1 of 5  ‐ Document Request List • Session 2 of 5 – IT Audit, Development Activities & Network/Application Security and Administration • Session 3 of 5 – Network/Application Security and Administration (continued) • Session 4 of 5 – IT Oversight and Supervision • Session 5 of 5 – Business Continuity/Disaster Recovery Planning (Today)

3

Speaker Information

G. Henry Hallman, III

Financial Program Manager & Team Supervisor North Carolina Commissioner of Banks ghallman@nccob.gov

Speaker Information

Bank Examinations Coordinator Alabama State Banking Department Donald.Robinson@banking.alabama.gov Brad Robinson

Business Continuity/Disaster Recovery Planning

6

Question 23

Are the business continuity/disaster recovery plans documented and appropriate for the size and complexity of the institution? Do they include an adequate business impact analysis and risk assessment?

7

Question 24

Are the business continuity and disaster recovery plans tested at least annually? Does testing include both systems and personnel using different testing methods such as failovers and tabletop testing? Does the institution have a data backup program in place? Is data backed up regularly and tested? Is there a contingency location so employees can continue to work? Is data stored offline to mitigate the risk of a ransomware attack on the online backup?

8

Question 25

Are the business continuity/disaster recovery plans reviewed, tested, and updated at least annually or when significant changes occur?

9

Question 26

Are remediation plans developed to address gaps identified during the testing? Are these efforts tracked and reviewed regularly?

10

Question 27

Can the entity successfully restore information and resume business operations from backups? Has this been tested recently?

11

Question 32

Does the institution have an incident response plan that establishes specific procedures for different types of incidents?

12

Question 33

Is there a communication plan in place for contacting employees, vendors, regulators, municipal authorities, emergency response personnel (as needed)?

13

Question 34

Is there a plan in place for notifying customers? Does the notification plan follow all appropriate state (and/or federal and international, if applicable) regulations and/or requirements?

14

Question 35

Is the Incident Response Plan reviewed, tested, and updated at least annually?

15

Question 36

When was the last time an incident occurred? How did the institution handle it? Are all incidents mitigated?

16

Question 37

Are information systems monitored for potential anomalies or security incidents?

17

Question 38

Are event logs collected or stored in a centralized location for later review?

18

Questions?

19

CSBS Virtual Discussion Series

Thank you for joining us!

We hope you have enjoyed the virtual discussion series on the Baseline Nonbank Cybersecurity Exam Program.

20

Made with FlippingBook - Online Brochure Maker