Federal Financial Institutions Examination Council (FFIEC) Cybersecurity Assessment. It is a framework designed to help financial institutions assess their cybersecurity risks and maturity levels. The FFIEC developed the tool to help banks, credit unions, and other financial institutions evaluate their cybersecurity posture against regulatory expectations.
Risk Management
A formal cybersecurity strategy is established and integrated into the overall business strategy and risk management processes.
Cybersecurity risk appetite and tolerances are defined documented and communicated across the organization.
Cybersecurity roles responsibilities and accountability are defined and assigned across the organization.
Comprehensive cybersecurity policies procedures and standards are developed approved communicated and regularly reviewed and updated.
Policies procedures and standards address key cybersecurity areas including but not limited to access control data security incident response and vendor management.
The board of directors and senior management actively oversee and are accountable for the organization’s cybersecurity risk management program.
Independent reviews and testing of the cybersecurity program are conducted periodically.
Information Sharing
Threat intelligence and other relevant cybersecurity information are shared effectively across relevant internal stakeholders.
The organization participates in external information sharing forums and leverages external threat intelligence sources.
The organization maintains awareness of the current and evolving threat landscape relevant to its operations.
A robust vulnerability management program is in place to identify assess and remediate vulnerabilities in a timely manner.
Security Architecture
Cybersecurity considerations are integrated into the design and implementation of systems and applications.
The network is segmented to limit the impact of security incidents.
Access to systems applications and data is based on the principle of least privilege.
Multi-factor authentication is implemented for privileged accounts and where appropriate for other accounts.
Physical access to critical facilities and data centers is appropriately controlled and monitored.
Remote access to the organization’s network and systems is secured and monitored.
Sensitive data at rest is encrypted.
Sensitive data in transit is encrypted.
Secure configuration standards are established implemented and maintained for all systems and devices.
A comprehensive patch management program is in place to ensure timely application of security patches.
Appropriate malware protection measures are implemented and kept up to date.
Regular data backups are performed and a recovery plan is in place and tested.
Information and devices are securely disposed of when no longer needed.
System activity is logged and monitored for suspicious or malicious behavior.
Firewalls and intrusion prevention systems are implemented and properly configured to control network traffic.
Email security measures are in place to protect against phishing and other email-borne threats.
Web security measures are implemented to protect against web-based attacks.
Physical security controls are implemented to protect IT assets and facilities from unauthorized access and environmental hazards.
Vendor Risk Management
A process is in place to identify and assess the cybersecurity risks associated with third-party service providers.
Appropriate due diligence and background checks are conducted on third-party service providers.
Cybersecurity requirements are included in contracts with third-party service providers.
Service level agreements with vendors address cybersecurity expectations and responsibilities.
The cybersecurity practices of third-party service providers are monitored on an ongoing basis.
Periodic reviews and audits of critical third-party service providers are conducted.
Processes are in place to coordinate incident response activities with third-party service providers.
Incident Management
A comprehensive incident response plan is developed that includes roles responsibilities communication procedures and contact information.
The incident response plan is tested regularly through various methods such as tabletop exercises and simulations.
Processes are in place to identify analyze and prioritize cybersecurity incidents.
Procedures are established for containing and eradicating cybersecurity incidents.
Procedures are in place for recovering from cybersecurity incidents and restoring affected systems and services.
Post-incident reviews are conducted to identify lessons learned and improve incident response procedures.
A comprehensive business continuity plan is developed to ensure the continuity of critical operations during disruptions.
The business continuity plan is tested regularly to ensure its effectiveness.
A comprehensive disaster recovery plan is developed to ensure the recovery of IT systems and data following a significant disruption.
The disaster recovery plan is tested regularly to ensure its effectiveness.
A communication plan is in place to inform stakeholders during and after a business disruption or cybersecurity incident.