IT Risk Discussion Paper

Total Page:16

File Type:pdf, Size:1020Kb

IT Risk Discussion Paper March 2018 IT Risk Discussion Paper DRAFTED BY Marc ANDRIES, David CARTEAU, Sylvie CORNAGGIA, Pascale GINOLHAC, Cyril GRUFFAT, Corinne Le MAGUER CONTRIBUTORS Roméo FENSTERBANK, Thierry FRIGOUT, Pierre HARGUINDEGUY, Christelle LACAZE EXECUTIVE SUMMARY The emergence of cyber-attacks in recent years has heightened concerns about IT risk. These concerns are not specific to the banking and insurance sectors, but they are of particular relevance to these sectors, which are essential components of a properly functioning economy and key actors in protecting public interests. To address these concerns, the supervisory authorities have gradually ramped up their actions in this field. International bodies have developed new IT risk rules, and authorities, such as the ACPR, acting in particular within the framework of the European Single Supervisory Mechanism for the banking system, have strengthened their supervision. This discussion paper emphasises that IT risk management is no longer a topic specific to IT teams, but must be part of an overall approach to risk control and risk management coordinated by the risk management function. Therefore, the operational risk management reference framework must be refined to more effectively include all aspects of IT risk within the recognised categories of operational risk. Under such an organisation, the management body must be directly involved in ensuring the alignment of its IT strategy with its risk appetite, but also in implementing and monitoring the risk management framework. Based on their supervisory experience, the various departments of the ACPR have developed a definition and classification of IT risk that cover its various aspects and enable treating it globally. Institutions supervised by the ACPR can use this classification to develop or reinforce their own risk map. This classification covers the three main processes applicable to implementation and management of information systems, i.e. issues in relation to the organisation, proper functioning and security of information systems. For each of these major processes, this discussion paper describes a set of risk factors, which are examined on two levels to enable a fairly detailed analysis. For each risk factor, the main expected measures for mitigating and controlling risks are presented. These measures are optional and institutions can tailor them to their specific context. They illustrate the best practices usually observed by the ACPR and they aim to create a common ground for controlling IT risk management in the banking and insurance sectors. ACPR – Information technology risk 2 CONTENTS 4 Introduction 6 IT risk and its inclusion in operational risk 6 1 Regulatory status at the international level 7 2 The ACPR’s approach to defining and classifying IT risk 11 Organising the information system, including its security 12 1 Involvement of the management body 13 2 Alignment of IT strategy with the business strategy 14 3 Budget management 15 4 Roles and responsibilities of the IT and information security functions 16 5 Rationalisation of the information system 17 6 Control of outsourcing 19 7 Statutory and regulatory compliance 20 8 Risk management 23 Operating the information system (“build and run”) 24 1 Operations management (systems and networks) 25 2 Continuity of operations management 28 3 Change management (projects, upgrades, fixes) 30 4 Data quality 32 Securing the information system 33 1 Physical protection of facilities 33 2 Identification of assets 34 3 Logical protection of assets 39 4 Detection of attacks 41 5 Response to attacks 43 Appendix: Classification of IT risk ACPR – Information technology risk 3 Introduction or several years, many international including guidelines to be followed by bodies have focused on the growing supervisory authorities for adopting a uni- IT risk in the banking and insurance form approach to assessing institutions’ IT F 2 sectors. This emphasis is driven by two risks. The European Insurance and observations. Firstly, institutions’ operations Occupational Pensions Authority (EIOPA3) now rely entirely on automated information has published an issues paper on cyber systems, including for customer relations,1 risk4 and has undertaken a review of this and these environments have become com- risk in conjunction with major players in plex to manage. Secondly, even when all the insurance sector. 1 This is at times referred to as the “digitisation” of banking precautions are taken, IT damage is a and insurance operations. major risk for these institutions’ operations. Among the various IT risks, cybersecurity 2 EBA (2017): “Guidelines on ICT Risk Assessment under the In particular, the capacity of cyber-attacks risks have been given particular attention Supervisory Review and Evaluation process (SREP)”, to cause harm has steadily increased in by several authorities. The G7 has adop- 11 May 2017. recent years. Whereas, initially, these ted high-level, non-binding principles 3 In French Autorité européenne des assurances et des pensions attacks focused primarily on customer intended to provide guidance and har- professionnelles (AEAPP). 5 4 Drafted by its Insurance and equipment and therefore were discrete monise actions in this area, and conti- Reinsurance Stakeholder Group events that caused little overall disruption, nues these actions on several fronts to (IRSG): “Cyber Risk – Some Strategic Issues” (April 2016). they now directly target institutions’ IT envi- encourage the efforts of regulators in 5 G7 (2016): “Fundamental Elements of Cybersecurity for the ronments and can have major conse- the sector. The Committee on Payments Financial Sector”, October and quences, including systemic impacts, due and Market Infrastructures (CPMI)6 of G7 (2017): “Fundamental Elements for Effective Assessment to the increasing interdependency between the Bank for International Settlements of Cybersecurity in the Financial Sector”, October. the various financial players. and the International Organisation of 6 Committee on Payments and 7 Market Infrastructures (CPMI). Securities Commissions (IOSCO) have 7 International Organisation In response, the bodies that develop inter- published guidelines to improve the resi- of Securities Commissions (IOSCO). national standards applicable to the lience of market infrastructures to 8 8 CPMI-IOSCO (2016): banking and insurance sectors have begun cyber-attacks. The International ”Guidance on Cyber Resilience for Financial Market to articulate their expectations vis-à-vis the Association of Insurance Supervisors Infrastructures”, June. industry. The European Banking Authority (IAIS)9 has also published an issues 9 International Association of Insurance Supervisors (IAIS). (EBA) has published several documents paper on cyber risk for the insurance 10 IAIS (2016): “Issues Paper prescribing standards in relation to the IT sector,10 which will be followed by an on Cyber Risk to the Insurance Sector”, August. risks to which the banking sector is exposed, implementation document. ACPR – Information technology risk 4 Introduction All of these documents explicitly or implicitly in the ECB’s actions by making its off-site recognise IT risk as an operational risk, as supervisors available to the SSM’s joint documented and then regulated by the Basel supervisory teams and by having onsite Committee on Banking Supervision (BCBS) inspections performed by the Banque de from 2003. However, the inclusion and France’s inspectors. In the areas in which treatment of IT risk within operational risk it has direct authority, such as “less-signifi- still needs to be clarified for the same treat- cant institutions”, other banking sector enti- ment principles to apply thereto. ties (in particular, finance companies and payment service providers) and insurance, On their side, the supervisory authorities the ACPR also carries out numerous actions have also significantly ramped up their in connection with its ongoing supervision actions in the IT risk field. Starting in and onsite inspections. The constant increase November 2014, when the European in IT risks is an ongoing challenge that Central Bank (ECB) acquired direct super- requires expanded resources and skills. visory powers over the largest banks of To meet this challenge, the ACPR has conti- Euro-zone (“significant institutions”), assisted nued its training actions and supplemented by national supervisory authorities compri- the dedicated onsite inspections teams with sing the Single Supervisory Mechanism a network of around 20 IT risk experts. (SSM), it immediately initiated several off-site These experts represent the ACPR in various supervisory actions and onsite inspections. international bodies working on IT risk and Assessment questionnaires focusing on cybersecurity issues. cybersecurity and IT outsourcing practices enabled a quick evaluation of the strengths This discussion paper was drafted by IT and weaknesses of the sector, which led to experts from the ACPR’s network. It aims corrective actions. Numerous onsite inspec- to focus attention on IT risk issues deemed tions, usually conducted by the national significant, both in terms of recognising authorities, supplemented the process and and reducing such risks. It is a contribution provided precise information on actions to to the discussion on how IT risk controls be carried out. should be incorporated into the operatio- nal risk management framework. Firstly, This approach was already well-established the paper proposes a definition of IT risk, in France because, in 1996,
Recommended publications
  • Mitigate Cyber Attack Risk Solution Brief
    SOLUTION BRIEF MITIGATE CYBER ATTACK RISK CONNECTING SECURITY, RISK MANAGEMENT & BUSINESS TEAMS TO MINIMIZE THE WIDESPREAD IMPACT OF A CYBER ATTACK DIGITAL TRANSFORMATION CREATES NEW RISKS As organizations extend technology deeper into their day-to-day business HIGH operations, their risk profiles evolve. DIGITAL RISK New digital risks—those unwanted and often unexpected outcomes that stem MEDIUM from digital transformation, digital business processes and the adoption RISK of related technologies—represent a LOW larger portion of potential obstacles to TRADITIONAL BUSINESS RISK achieving business objectives. While the digital technology creates new DIGITAL ADOPTION business opportunities, it frequently leads to higher levels of cybersecurity, FIGURE 1: Digital risk increasing the overall business risk as organizations embrace digital transformation. third-party, compliance and business resiliency risk. The impacts from these growing digital risks may be more disruptive than the operational risks that businesses have historically managed. In fact, many organizations are finding that as digital adoption accelerates, digital risk becomes the greatest facet of risk they face, especially growing cyber risks. AS ORGANIZATIONS EXPAND DIGITAL OPERATIONS, CYBER SECURITY RISKS MULTIPLY Organizations need to evolve to stay in front of rising cyber threats and their wide-reaching impact across increasingly digitized operations. Attackers continue to advance and use sophisticated techniques to infiltrate organizations which no longer have well defined perimeters. At the same time, responsibilities for detecting and responding to security It’s arguably impossible incidents are expanding beyond the security operations center (SOC). Business stakeholders continue to digitize their operations, elevating the risk and potential to prevent all cyber impact of cyber attacks.
    [Show full text]
  • Cybersecurity in a Digital Era.Pdf
    Digital McKinsey and Global Risk Practice Cybersecurity in a Digital Era June 2020 Introduction Even before the advent of a global pandemic, executive teams faced a challenging and dynamic environ- ment as they sought to protect their institutions from cyberattack, without degrading their ability to innovate and extract value from technology investments. CISOs and their partners in business and IT functions have had to think through how to protect increasingly valuable digital assets, how to assess threats related to an increasingly fraught geopolitical environment, how to meet increasingly stringent customer and regulatory expectations and how to navigate disruptions to existing cybersecurity models as companies adopt agile development and cloud computing. We believe there are five areas for CIOs, CISOs, CROs and other business leaders to address in particular: 1. Get a strategy in place that will activate the organization. Even more than in the past cybersecurity is a business issue – and cybersecurity effectiveness means action not only from the CISO organiza- tion, but also from application development, infrastructure, product development, customer care, finance, human resources, procurement and risk. A successful cybersecurity strategy supports the business, highlights the actions required from across the enterprise – and perhaps most importantly captures the imagination of the executive in how it can manage risk and also enable business innovation. 2. Create granular, analytic risk management capabilities. There will always be more vulnerabilities to address and more protections you can consider than you will have capacity to implement. Even companies with large and increasing cybersecurity budgets face constraints in how much change the organization can absorb.
    [Show full text]
  • IT Risk Management and Control Frameworks
    IT Risk Management and Control Frameworks Guðjón Viðar Valdimarsson CIA, CFSA, CISA Product Manager and Internal Auditor Summary • Introduction or the “art” of Risk Management • The objectives, risks and controls • Risk Management Methodology • The control frameworks • IT Risk Management Introduction or the “art” of Risk Management “Risk management is the identification, assessment, and prioritization of risks followed by coordinated and economical application of resources to minimize, monitor, and control the probability and/or impact of unfortunate events or to maximize the realization of opportunities.” Or how to stop bad things from happening by figuring out what can happen and do something about it ! What do you need ? To do a risk assessment you need : Objectives/assets • What does management and the board want to aim for in terms of risk appetite and risk tolerance. • What are the critical assets and processess you want to protect Risks • What are the relevant risks for the subject/assets at hand Controls • What generally accepted control framework is appropriate for the subject matter. Risk Management Methodology There are a number areas of risk management areas depending on the industry or subject at hand. Risk Risk Risk Financial risk management Enterprise management management management activities as risk regarding of (VaR and applied to management natural information CVaR) project disasters technology management IT Risk Management The Certified Information Systems Auditor Review Manual provides the following definition of
    [Show full text]
  • The Reputational Impact of It Risk
    FALLOUT THE REPUTATIONAL IMPACT OF IT RISK IN ASSOCIATION WITH: CONTENTS Executive Summary ..............................................................................................................................................2 Introduction: The Black Friday data breach .................................................................................................3 Where the Risks Are: From Human Error to System Failure ................................................................ 5 Sidebar: The Promise and Perils of the Cloud............................................................................................11 Protecting Your Reputation in the Always-On World ............................................................................12 Conclusion ..............................................................................................................................................................18 Acknowledgments...............................................................................................................................................19 EXECUTIVE SUMMARY U.S. retailers were not the first to su!er a massive data breach. Nor will they be the last, as cyber attacks, security breaches and system outages proliferate. Shadow technology and expanding supply chains bring more risks. How can companies better protect their reputation by ensuring the continuous—and secure—flow of information to support their business? After all, a major part of the brand experience for most customers comes through the
    [Show full text]
  • Software Security Total Risk Management
    Software Security Total Risk Management SECURITY INNOVATION’S BLUEPRINT FOR EFFECTIVE PROGRAM DEVELOPMENT 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 www.securityinnovation.com Software Security Total Risk Management 2 Table of Contents Introduction ......................................................................................................................................3 Why Software Security Risk Management Matters .............................................................................3 Why Software Security Risk Management Gets Overlooked ................................................................4 Foundations of IT Risk Management ...................................................................................................5 Operational Integration, Availability and Security Risk Management ...................................................6 From ITSRM to Software Security Total Risk Management ..................................................................7 The Steps of the SSTRM......................................................................................................................8 Summary ......................................................................................................................................... 10 www.securityinnovation.com Software Security Total Risk Management INTRODUCTION 3 Introduction Current challenges of the financial services sector aside, risk management has a long and venerable tradition of practical success in the world of insurance
    [Show full text]
  • The Case for Enterprise Risk Management in Insurance Manage Risk, Change Your Business, Create Value, Achieve Your Objectives
    Research partner Independent research by The Case for Enterprise Risk Management in Insurance Manage risk, change your business, create value, achieve your objectives March 2017 About Chartis Chartis Research is the leading provider of research and analysis on the global market for risk technology. It is part of Incisive Media, which owns market-leading brands such as Risk and Waters Technology. Chartis’s goal is to support enterprises as they drive business performance through improved risk management, corporate governance and compliance and to help clients make informed technology and business decisions by providing in-depth analysis and actionable advice on virtually all aspects of risk technology. Areas of expertise include: • Credit risk • Operational risk and governance, risk and compliance (GRC) • Market risk • Asset and liability management (ALM) and liquidity risk • Energy and commodity trading risk • Financial crime including trader surveillance, anti-fraud and anti-money laundering • Cyber risk management • Insurance risk • Regulatory requirements including Basel 2 and 3, Dodd-Frank, MiFID II and Solvency II Chartis is solely focussed on risk and compliance technology, which gives it a significant advantage over generic market analysts. The firm has brought together a leading team of analysts and advisors from the risk management and financial services industries. This team has hands-on experience of implementing and developing risk management systems and programs for Fortune 500 companies and leading consulting houses. Visit www.chartis-research.com for more information. Join our global online community at www.risktech-forum.com. © Copyright Chartis Research Ltd 2017. All Rights Reserved. Chartis Research is a wholly owned subsidiary of Incisive Media Ltd.
    [Show full text]
  • Privacy As a Risk Management Challenge for Corporate Practice
    Privacy as a Risk Management Challenge for Corporate Practice By Kathleen Greenaway, Susan Zabolotniuk and Avner Levin Research Assistance provided by Judit Langhammer, Colin Rogers and Melanie Torrie March 2012 This is a work in progress which will be updated frequently. It is not for public use, duplication, citation, linking or other reference without the express written permission of the authors. PRIVACY AND CYBER CRIME INSTITUTE Acknowledgements This project has been funded through the Contribution Program of the Office of the Federal Privacy Commissioner and in-kind contributions from the Office of the Dean of the Ted Page | 2 Rogers School of Management, Ryerson University. We are grateful to both organizations for supporting research into the privacy practices of Canadian organizations. We also thank the companies and privacy experts who gave of their time and lent their expertise to assist us with this study. It is reassuring to meet Canadian business people who value research sufficiently to participate in our project. Finally, we thank our student researchers, Judit Langhammer, Colin Rogers and Melanie Torrie for their enthusiastic and able assistance. Table of Contents Acknowledgements Page | 3 Introduction Privacy Risk Management in context Project Goals and Objectives Methodology Literature Review Academic LIT Practitioner LIT Regulatory LIT The Concept of STILL TO BE SORTED Privacy as a Risk Management Privacy Risk Discipline Privacy risk as operational risk Governance considerations & etc. PRM in action in STILL TO BE SORTED Canadian Organizations & etc. CONCLUSION Summary of Findings Recommendations Future Research REFERENCES APPENDICES Lit Review tables PRM – Review of available models Page | 4 Risk/RM in Guidance Documents Research protocols Introduction Privacy Risk Management in context Organizations appear to have entered a “third phase” in their approach to the provision of Page | 5 information privacy to their customers.
    [Show full text]
  • Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance
    Cyber Benefits and Risks: Quantitatively Understanding and Forecasting the Balance Extended Project Report from the Frederick S. Pardee Center for International Futures Josef Korbel School of International Studies University of Denver www.pardee.du.edu September 2015 Barry B. Hughes, David Bohl, Mohammod Irfan, Eli Margolese-Malin, and José Solórzano In project collaboration with and the Table of Contents Executive Summary 4 Conceptualizing Benefits and Costs 4 Using the IFs System for Analysis 4 Background Research Foundations 5 Forecasts and Findings 9 Conclusion 11 A Final Note on Study Contributions 12 1. Introduction: Understanding and Anticipating Change in the Benefits and Costs of Cyber Technology 13 2. ICT and Cyber Development Indices 18 Indices Replicated in the IFs Forecasting System 18 ICT Development Index 18 Global Cybersecurity Index 19 Additional Indices of Importance in Cyber Security Analyses 21 Digitization Index 21 Digital Economy Ranking Index 21 Networked Readiness Index 22 3. Benefits 23 Competing Schools of Thought on Economic Benefits 23 Pessimism Versus optimism concerning ICT’s economic production impacts 23 ICT as a general-purpose technology 25 ICT’s Economic Impact: The Production Side 26 ICT as a growth sector in the economy 26 ICT investment and capital services 29 ICT and multifactor productivity 32 Comparing the Productivity Impacts of GPTs: Steam, Electricity, ICT 33 Variation in ICT Impact across Time/Pervasiveness and Countries 36 Drivers of variation in ICT impact: ICT (especially broadband) pervasiveness 36 Drivers of variable ICT impact: Beyond PCs and broadband 39 Drivers of variable ICT impact: Country development level 41 Consumer Surplus 42 Consumer surplus forecasts 46 Summary of Knowledge Concerning Cyber Risk Benefits: Modeling Implications 47 4.
    [Show full text]
  • Decoding the Future IT Risk Management. Disrupted
    Decoding the future IT Risk Management. Disrupted. Exploring the future of IT risk management By Chris Recchia, Tom Bigham and Rob Dighton Decoding the future | IT Risk Management. Disrupted. IT Risk Management. Disrupted. With fragmented IT architecture and legacy infrastructure still widespread across the financial services industry, many organisations are already struggling to get IT risk management right. A wave of change is coming that will make this challenge even more complex. Current approaches to managing IT risk, developed in an era focused on establishing controls for financial reporting, are no longer fit-for-purpose and need to be redesigned. Now is the time for senior financial services risk professionals to begin preparing for the array of changes that are altering the world in which we all operate and compete. The need for effective risk management is rapidly increasing in response to the rise in threats and the unprecedented wave of innovation spreading across the financial services industry. Robotics, Fintech, artificial intelligence, cognitive computing and blockchain are some of the emerging trends that are expected to reshape the financial services industry and have a substantial impact on firms of all sizes and geographical spread. Financial services firms employ many more risk managers than they traditionally did, yet risk management teams remain on a reactive footing with a predominant focus on traditional IT general controls and risk assessment techniques, and are limited by the processes, systems and wider business insight with which they have been equipped. As technology transforms banking and insurance and shifts the risk landscape, organisations will need to develop an entirely new approach to IT risk management.
    [Show full text]
  • Information Technology Sector Baseline Risk Assessment
    Information Technology Sector Baseline Risk Assessment Table of Contents EXECUTIVE SUMMARY .........................................................................................................................................4 1 INTRODUCTION TO INFORMATION TECHNOLOGY SECTOR CRITICAL INFRASTRUCTURE PROTECTION ............................................................................................................................................................9 1.1. PARTNERING FOR SECURITY...........................................................................................................................9 1.2. IT SECTOR PROFILE......................................................................................................................................11 2 RISK MANAGEMENT APPROACH, METHODOLOGY, AND PROCESS ............................................13 2.1. ASSESSING RISK AT A SECTOR-LEVEL ..........................................................................................................13 2.2. IDENTIFYING CRITICAL FUNCTIONS..............................................................................................................14 2.3. DEVELOPING ATTACK TREES .......................................................................................................................16 2.4. IDENTIFYING AND MEASURING RISK ............................................................................................................17 2.4.1 Analyzing Threats ................................................................................................................................17
    [Show full text]
  • Guide to the Sarbanes-Oxley Act: IT Risks and Controls (Second Edition)
    1. FPO Guide to the Sarbanes-Oxley Act: IT Risks and Controls Second Edition Table of Contents Introduction .............................................................................................................................. 1 Overall IT Risk and Control Approach and Considerations When Complying with Sarbanes-Oxley .... 2 1. Is there an overall approach to IT risk and control consideration that should be followed? .......................... 2 2. Why is it so important to consider IT when evaluating internal control over financial reporting? ............... 4 3. How should Section 404 compliance teams define “IT risks and controls”? .................................................. 5 4. How does management identify and prioritize IT risks? ................................................................................. 5 5. What guidance does COSO provide with respect to IT controls? .................................................................. 6 6. What guidance is provided by the Information Systems Audit and Control Association’s (ISACA) Control Objectives for Information and Related Technologies (COBIT) framework with respect to IT controls? ........................................................................................................... 6 7. How do COSO and COBIT facilitate a Section 404 compliance effort? ........................................................ 6 8. If a Section 404 project strictly and only follows COBIT, will the project be compliant with the Section 404 compliance efforts? .......................................................................................................................
    [Show full text]
  • Risk Management Guide for Information Technology Systems
    Special Publication 800-30 Risk Management Guide for Information Technology Systems Recommendations of the National Institute of Standards and Technology Gary Stoneburner, Alice Goguen, and Alexis Feringa NIST Special Publication 800-30 Risk Management Guide for Information Technology Systems Recommendations of the National Institute of Standards and Technology Gary Stoneburner, Alice Goguen1, and 1 Alexis Feringa C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 1Booz Allen Hamilton Inc. 3190 Fairview Park Drive Falls Church, VA 22042 July 2002 U.S. DEPARTMENT OF COMMERCE Donald L. Evans, Secretary TECHNOLOGY ADMINISTRATION Phillip J. Bond, Under Secretary for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arden L. Bement, Jr., Director SP 800-30 Page ii Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology promotes the U.S. economy and public welfare by providing technical leadership for the nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof-of- concept implementations, and technical analyses to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in federal computer systems. The Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-30 Natl.
    [Show full text]