170 likes | 290 Views
Information Security Guidelines. ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002. Background- 501(b) Guidelines. Required by GLBA
E N D
Information Security Guidelines ABA’s Technology Risk Management – A Strategic Approach Telephone/Webcast Briefing June 17, 2002
Background- 501(b) Guidelines • Required by GLBA • Purpose: to ensure security & confidentiality of customer information • Effective July 1, 2001 • Effective July 1, 2003, for contracts entered into on or before March 5, 2001 • Guidelines, FIL 22-2001 (3/14/01) • Exam Procedures, FIL 68-2001 (8/24/01)
What Do Guidelines Require • Identify & assess risks to customer information • Design & implement program to control risks • Board review & approval • Test key controls (at least annually) • Train personnel • Adjust the plan on a continuing basis to account for changes in technology, the sensitivity of customer information, and internal/external threats to information security.
Types of Information to be Protected • Customer’s nonpublic personal information (uses Privacy regulation definition) • Does not apply to business customers • Does not apply to consumers with no ongoing relationship (e.g., purchase a cashier’s check, use your ATM network)
Key #1- Risk Assessment Each bank shall: • Identify reasonably foreseeable internal & external threats that could result in unauthorized disclosure, misuse, alteration, or destruction of customer information; • Assess the likelihood & potential damage of these threats taking sensitivity of information into consideration; and • Assess sufficiency of procedures in place to control these risks.
Key #2- Security Program Each bank shall: • Design an information security program to control identified risks, commensurate with the sensitivity of the information as well as the complexity & scope of the bank’s activities • Consider the eight security measures listed in §III.C.1, and adopt if appropriate
The “Laundry List” • Logical access controls • Physical access controls • Encryption • System modification procedures • Dual controls, segregation of duties, background checks • IDS • Incident response program • Emergency plan
Key #3- Oversee Service Providers Each bank shall: • Exercise appropriate due diligence in selecting service providers; • Require service providers by contract to implement appropriate measures designed to meet the guideline’s objectives; and • Monitor (where indicated by bank’s risk assessment) its service providers to confirm they have satisfied their obligations.
FDIC Examiner Survey • DOS follow-up usually done within 1 year of new requirement • Survey sent to every field office in all 8 regional offices • 5 questions • Informal survey, not intended to be “scientific”
FDIC Examiner Survey • Survey Questions: • 3 most common deficiencies • Most common question asked by bankers • Is there confusion between privacy regulation and security guidelines? • How much time have banks spent complying? • How long for examiners to complete this part of exam?
Three Most Common Deficiencies 1. Inadequate risk assessment -Slightly more than half of responses noted banks with no assessment 2. Inadequate security policy/program -About one-third of responses noted banks with no written security policy 3. Inadequate: Board involvement, testing, training
Most Common Banker Question 1. How should a bank perform & document a risk assessment? 2. Does FDIC have any further guidance on what an acceptable risk assessment & security policy should look like? • What guidelines? • Am I in compliance? • What are other banks doing?
Confusion With Privacy Regulation • YES • Overall, very large percentage of survey forms said that bankers confuse privacy regulation & security guidelines • Some bankers think they are same thing • Some bankers think compliance with privacy regulation means compliance with security guidelines
Time Spent Complying • No significant expenditure of time so far (see previous slides) • Banks anticipate significant time going forward • Large v. small banks • Some $ spent, mostly time • Some are comparing burden to Y2K
Time Spent by Examiners • Nationwide overall average: about 1-1/2 days • Significantly less for banks with no security program and very small banks • More time for banks with a security program and large banks
Recommendations • Become familiar with what the guidelines require • Conduct & document a formal, comprehensive risk assessment • Develop a written security policy/program • Brief the Board of Directors and get their approval