FFIEC CAT May 2017 All Documents Combined
FFIEC CAT May 2017 All Documents Combined
FFIEC CAT May 2017 All Documents Combined
1
The FFIEC comprises the principals of the following: The Board of Governors of the Federal Reserve System,
Federal Deposit Insurance Corporation, National Credit Union Administration, Office of the Comptroller of the
Currency, Consumer Financial Protection Bureau, and State Liaison Committee.
2
A mapping is available in Appendix B: Mapping Cybersecurity Assessment Tool to the NIST Cybersecurity
Framework. NIST reviewed and provided input on the mapping to ensure consistency with Framework principles
and to highlight the complementary nature of the two resources.
June 2015 1
FFIEC Cybersecurity Assessment Tool Overview for CEOs and Boards of Directors
• Oversee the performance of ongoing monitoring to remain nimble and agile in addressing
evolving areas of cybersecurity risk.
• Oversee changes to maintain or increase the desired cybersecurity preparedness.
The role of the board, or an appropriate board committee, may include the responsibility to do
the following:
• Engage management in establishing the institution’s vision, risk appetite, and overall
strategic direction.
• Approve plans to use the Assessment.
• Review management’s analysis of the Assessment results, inclusive of any reviews or
opinions on the results issued by independent risk management or internal audit functions
regarding those results.
• Review management’s determination of whether the institution’s cybersecurity preparedness
is aligned with its risks.
• Review and approve plans to address any risk management or control weaknesses.
• Review the results of management’s ongoing monitoring of the institution’s exposure to and
preparedness for cyber threats.
Assessment’s Parts and Process
The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity. Upon
completion of both parts, management can evaluate whether the institution’s inherent risk and
preparedness are aligned.
Inherent Risk Profile
Cybersecurity inherent risk is the level of risk posed to the institution by the following:
• Technologies and Connection Types
• Delivery Channels
• Online/Mobile Products and Technology Services
• Organizational Characteristics
• External Threats
Inherent risk incorporates the type, volume, and complexity of the institution’s operations and
threats directed at the institution. Inherent risk does not include mitigating controls. The Inherent
Risk Profile includes descriptions of activities across risk categories with definitions for the least
to most levels of inherent risk. The profile helps management determine exposure to risk that the
institution’s activities, services, and products individually and collectively pose to the institution.
When each of the activities, services, and products are assessed, management can review the
results and determine the institution’s overall inherent risk profile.
June 2015 2
FFIEC Cybersecurity Assessment Tool Overview for CEOs and Boards of Directors
Cybersecurity Maturity
The Assessment’s second part is Cybersecurity Maturity, designed to help management measure
the institution’s level of risk and corresponding controls. The levels range from baseline to
innovative. Cybersecurity Maturity includes
statements to determine whether an institution’s Innovative
behaviors, practices, and processes can support
cybersecurity preparedness within the following Advanced
five domains:
• Cyber Risk Management and Oversight Intermediate
• Threat Intelligence and Collaboration
• Cybersecurity Controls Evolving
• External Dependency Management
• Cyber Incident Management and Resilience
The domains include assessment factors and Baseline
contributing components. Within each
component, declarative statements describe
activities supporting the assessment factor at each
maturity level. Management determines which declarative statements best fit the current
practices of the institution. All declarative statements in each maturity level, and previous
levels, must be attained and sustained to achieve that domain’s maturity level. While
management can determine the institution’s maturity level in each domain, the Assessment is not
designed to identify an overall cybersecurity maturity level. The figure below provides the five
domains and assessment factors.
Domain 4:
Domain 1: Cyber Domain 2: Threat Domain 3: Domain 5: Cyber
External
Risk Management Intelligence & Cybersecurity Incident Management
Dependency
& Oversight Collaboration Controls and Resilience
Management
Incident
Threat Preventative Resilience
Governance Connections
Intelligence Controls Planning and
Strategy
Detection,
Risk Monitoring and Detective Relationship
Response, and
Management Analyzing Controls Management
Mitigation
Training and
Culture
June 2015 3
FFIEC Cybersecurity Assessment Tool Overview for CEOs and Boards of Directors
Management can review the institution’s Inherent Risk Profile in relation to its Cybersecurity
Maturity results for each domain to understand whether they are aligned. The following table
depicts the relationship between an institution’s Inherent Risk Profile and its domain Maturity
Levels, as there is no single expected level for an institution. In general, as inherent risk rises, an
institution’s maturity levels should increase. An institution’s inherent risk profile and maturity
levels will change over time as threats, vulnerabilities, and operational environments change.
Thus, management should consider reevaluating the institution’s inherent risk profile and
cybersecurity maturity periodically and when planned changes can affect its inherent risk profile
(e.g., launching new products or services, new connections).
Risk/Maturity Inherent Risk Levels
Relationship
Innovative
Maturity Level for
Cybersecurity
Each Domain
Advanced
Intermediate
Evolving
Baseline
Management can then decide what actions are needed either to affect the inherent risk profile or
to achieve a desired state of maturity. On an ongoing basis, management may use the
Assessment to identify changes to the institution’s inherent risk profile when new threats arise or
when considering changes to the business strategy, such as expanding operations, offering new
products and services, or entering into new third-party relationships that support critical
activities. Consequently, management can determine whether additional risk management
practices or controls are needed to maintain or augment the institution’s cybersecurity maturity.
Supporting Implementation
An essential part of implementing the Assess
Assessment is to validate the institution’s maturity and
inherent risk
process and findings and the effectiveness and
sufficiency of the plans to address any
identified weaknesses. The next section Identify gaps
Reevaluate
provides some questions to assist management in alignment
June 2015 4
FFIEC Cybersecurity Assessment Tool Overview for CEOs and Boards of Directors
June 2015 5
FFIEC
Cybersecurity Assessment Tool
May 2017
Paperwork Reduction Act (PRA) – OMB Control No. 1557-0328; Expiration date: August 31, 2019
The above OMB Control Number and expiration date pertain to a requirement of the Paperwork Reduction
Act and its implementing regulation that a federal agency may not conduct or sponsor, and a person (or
organization) is not required to respond to, a collection of information unless it displays a currently valid
OMB control number and, if appropriate, an expiration date. See 44 USC 3506(c)(1)(B) and 5 CFR
1320.5(b)(2)(i), 1320.8(b)(1).
FFIEC Cybersecurity Assessment Tool Contents
Contents
Contents ........................................................................................................................................... i
User’s Guide ................................................................................................................................... 1
Overview ..................................................................................................................................... 1
Background ................................................................................................................................. 2
Completing the Assessment ........................................................................................................ 2
Part One: Inherent Risk Profile ............................................................................................... 3
Part Two: Cybersecurity Maturity .......................................................................................... 5
Interpreting and Analyzing Assessment Results..................................................................... 8
Resources .................................................................................................................................. 10
Inherent Risk Profile ..................................................................................................................... 11
Cybersecurity Maturity ................................................................................................................. 19
Domain 1: Cyber Risk Management and Oversight ................................................................. 19
Domain 2: Threat Intelligence and Collaboration .................................................................... 30
Domain 3: Cybersecurity Controls ........................................................................................... 34
Domain 4: External Dependency Management ........................................................................ 47
Domain 5: Cyber Incident Management and Resilience .......................................................... 51
Additional Resources
Overview for Chief Executive Officers and Boards of Directors
Appendix A: Mapping Baseline Statements to FFIEC IT Examination Handbook
Appendix B: Mapping Cybersecurity Assessment Tool to NIST Cybersecurity Framework
Appendix C: Glossary
May 2017 i
FFIEC Cybersecurity Assessment Tool User’s Guide
User’s Guide
Overview
In light of the increasing volume and sophistication of cyber threats, the Federal Financial
Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Assessment Tool
(Assessment), on behalf of its members, to help institutions identify their risks and determine
their cybersecurity maturity.
The content of the Assessment is consistent with the principles of the FFIEC Information
Technology Examination Handbook (IT Handbook) and the National Institute of Standards and
Technology (NIST) Cybersecurity Framework, 2 as well as industry accepted cybersecurity
practices. The Assessment provides institutions with a repeatable and measureable process to
inform management of their institution’s risks and cybersecurity preparedness.
The Assessment consists of two parts: Inherent Risk Profile and Cybersecurity Maturity. The
Inherent Risk Profile identifies the institution’s inherent risk before implementing controls. The
Cybersecurity Maturity includes domains, assessment factors, components, and individual
declarative statements across five maturity levels to identify specific controls and practices that
are in place. While management can determine the institution’s maturity level in each domain,
the Assessment is not designed to identify an overall cybersecurity maturity level.
To complete the Assessment, management first assesses the institution’s inherent risk profile
based on five categories:
• Technologies and Connection Types
• Delivery Channels
• Online/Mobile Products and Technology Services
• Organizational Characteristics
• External Threats
Management then evaluates the institution’s Cybersecurity Maturity level for each of five
domains:
• Cyber Risk Management and Oversight
• Threat Intelligence and Collaboration
• Cybersecurity Controls
• External Dependency Management
• Cyber Incident Management and Resilience
1
The FFIEC comprises the principals of the following: The Board of Governors of the Federal Reserve System,
Federal Deposit Insurance Corporation, National Credit Union Administration, Office of the Comptroller of the
Currency, Consumer Financial Protection Bureau, and State Liaison Committee.
2
A mapping is available in Appendix B: Mapping Cybersecurity Assessment Tool to the NIST Cybersecurity
Framework. NIST reviewed and provided input on the mapping to ensure consistency with Framework principles
and to highlight the complementary nature of the two resources.
May 2017 1
FFIEC Cybersecurity Assessment Tool User’s Guide
By reviewing both the institution’s inherent risk profile and maturity levels across the domains,
management can determine whether its maturity levels are appropriate in relation to its risk. If
not, the institution may take action either to reduce the level of risk or to increase the levels of
maturity. This process is intended to complement, not replace, an institution’s risk management
process and cybersecurity program.
Background
The Assessment is based on the cybersecurity assessment that the FFIEC members piloted in
2014, which was designed to evaluate community institutions’ preparedness to mitigate cyber
risks. NIST defines cybersecurity as “the process of protecting information by preventing,
detecting, and responding to attacks.” As part of cybersecurity, institutions should consider
managing internal and external threats and vulnerabilities to protect infrastructure and
information assets. The definition builds on information security as defined in FFIEC guidance.
Cyber incidents can have financial, operational, legal, and reputational impact. Recent high-
profile cyber attacks demonstrate that cyber incidents can significantly affect capital and
earnings. Costs may include forensic investigations, public relations campaigns, legal fees,
consumer credit monitoring, and technology changes. As such, cybersecurity needs to be
integrated throughout an institution as part of enterprise-wide governance processes, information
security, business continuity, and third-party risk management. For example, an institution’s
cybersecurity policies may be incorporated within the information security program. In addition,
cybersecurity roles and processes referred to in the Assessment may be separate roles within the
security group (or outsourced) or may be part of broader roles across the institution.
May 2017 2
FFIEC Cybersecurity Assessment Tool User’s Guide
May 2017 3
FFIEC Cybersecurity Assessment Tool User’s Guide
Select the most appropriate inherent risk level for each activity, service, or product within each
category. The levels range from Least Inherent Risk to Most Inherent Risk (Figure 1) and
incorporate a wide range of descriptions. The risk levels provide parameters for determining the
inherent risk for each category. These parameters are not intended to be rigid but rather
instructive to assist with assessing a risk level within each activity, service, or product. For
situations where the risk level falls between two levels, management should select the higher risk
level.
Figure 1: Inherent Risk Profile Layout Risk Levels
Risk Levels
Category: Technologies and
Connection Types Least Minimal Moderate Significant Most
Total number of Internet service provider No connections Minimal complexity (1– Moderate complexity Significant complexity Substantial complexity
(ISP) connections (including branch 20 connections) (21–100 connections) (101–200 connections) (>200 connections)
connections)
Unsecured external connections, number None Few instances of Several instances of Significant instances of Substantial instances of
Activity, of connections not users (e.g., file transfer
protocol (FTP), Telnet, rlogin)
unsecured
connections (1–5)
unsecured connections
(6–10)
unsecured connections
(11–25)
unsecured connections
(>25)
Service, or
Product Wireless network access No wireless access Separate access
points for guest
Guest and corporate
wireless network access
Wireless corporate
network access;
Wireless corporate
network access; all
wireless and corporate are logically separated; significant number of employees have
wireless limited number of users users and access points access; substantial
and access points (1– (251–1,000 users; 26– number of access
250 users; 1–25 access 100 access points) points (>1,000 users;
points) >100 access points)
May 2017 4
FFIEC Cybersecurity Assessment Tool User’s Guide
institution may outsource mission-critical systems and applications and may support
elements internally. There is a greater variety of products and services offered through
diverse channels.
• Significant Inherent Risk. An institution with a Significant Inherent Risk Profile generally
uses complex technology in terms of scope and sophistication. The institution offers high-
risk products and services that may include emerging technologies. The institution may host
a significant number of applications internally. The institution allows either a large number
of personal devices or a large variety of device types. The institution maintains a substantial
number of connections to customers and third parties. A variety of payment services are
offered directly rather than through a third party and may reflect a significant level of
transaction volume.
• Most Inherent Risk. An institution with a Most Inherent Risk Profile uses extremely
complex technologies to deliver myriad products and services. Many of the products and
services are at the highest level of risk, including those offered to other organizations. New
and emerging technologies are utilized across multiple delivery channels. The institution may
outsource some mission-critical systems or applications, but many are hosted internally. The
institution maintains a large number of connection types to transfer data with customers and
third parties.
May 2017 5
FFIEC Cybersecurity Assessment Tool User’s Guide
Domain 2
Threat Intelligence and Collaboration
Threat intelligence and collaboration includes processes to effectively discover, analyze, and understand cyber
threats, with the capability to share information internally and with appropriate third parties.
Assessment Threat Intelligence refers to the acquisition and analysis of information to identify, track, and
Factors predict cyber capabilities, intentions, and activities that offer courses of action to enhance decision
making.
Monitoring and Analyzing refers to how an institution monitors threat sources and what analysis
may be performed to identify threats that are specific to the institution or to resolve conflicts in the
different threat intelligence streams.
Information Sharing encompasses establishing relationships with peers and information-sharing
forums and how threat information is communicated to those groups as well as internal
stakeholders.
Domain 3
Cybersecurity Controls
Cybersecurity controls are the practices and processes used to protect assets, infrastructure, and information by
strengthening the institution’s defensive posture through continuous, automated protection and monitoring.
Assessment Preventative Controls deter and prevent cyber attacks and include infrastructure management,
Factors access management, device and end-point security, and secure coding.
Detective Controls include threat and vulnerability detection, anomalous activity detection, and
event detection, may alert the institution to network and system irregularities that indicate an
incident has or may occur.
Corrective Controls are utilized to resolve system and software vulnerabilities through patch
management and remediation of issues identified during vulnerability scans and penetration testing.
Domain 4
External Dependency Management
External dependency management involves establishing and maintaining a comprehensive program to oversee and
manage external connections and third-party relationships with access to the institution’s technology assets and
information.
Assessment Connections incorporate the identification, monitoring, and management of external connections
Factors and data flows to third parties.
Relationship Management includes due diligence, contracts, and ongoing monitoring to help
ensure controls complement the institution’s cybersecurity program.
May 2017 6
FFIEC Cybersecurity Assessment Tool User’s Guide
Domain 5
Cyber Incident Management and Resilience
Cyber incident management includes establishing, identifying, and analyzing cyber events; prioritizing the
institution’s containment or mitigation; and escalating information to appropriate stakeholders. Cyber resilience
encompasses both planning and testing to maintain and recover ongoing operations during and following a cyber
incident.
Assessment Incident Resilience Planning & Strategy incorporates resilience planning and testing into existing
Factors business continuity and disaster recovery plans to minimize service disruptions and the destruction
or corruption of data.
Detection, Response, & Mitigation refers to the steps management takes to identify, prioritize,
respond to, and mitigate the effects of internal and external threats and vulnerabilities.
Escalation & Reporting ensures key stakeholders are informed about the impact of cyber
incidents, and regulators, law enforcement, and customers are notified as required.
May 2017 7
FFIEC Cybersecurity Assessment Tool User’s Guide
and managing the information security and business continuity programs. (FFIEC Information Security Booklet, page 3)
Information security risks are discussed in management meetings when prompted by highly visible cyber events or regulatory
alerts. (FFIEC Information Security Booklet, page 6)
Management provides a written report on the overall status of the information security and business continuity programs to the
board or an appropriate board committee at least annually. (FFIEC Information Security Booklet, page 5)
The budgeting process includes information security related expenses and tools. (FFIEC E-Banking Booklet, page 20)
Management considers the risks posed by other critical infrastructures (e.g., telecommunications, energy) to the institution.
(FFIEC Business Continuity Planning Booklet, page J-12)
Declarative
Evolving At least annually, the board or an appropriate board committee reviews and approves the institution’s cybersecurity program.
Statement
Management is responsible for ensuring compliance with legal and regulatory requirements related to cybersecurity.
Cybersecurity tools and staff are requested through the budget process.
Component
There is a process to formally discuss and estimate potential expenses associated with cybersecurity incidents as part of the
budgeting process.
Management determines which declarative statements best fit the current practices of the
institution. All declarative statements in each maturity level, and previous levels, must be
attained and sustained to achieve that domain’s maturity level. Attained and sustained requires
affirmative answers to either “Yes” or “Yes with Compensating Controls” 3 for each of the
declarative questions within a maturity level. While management can determine the institution’s
maturity level in each domain, the Assessment is not designed to identify an overall
cybersecurity maturity level.
Management may determine that a declarative statement has been sufficiently sustained based on
proven results. Certain declarative statements may not apply to all institutions if the product,
service, or technology is not offered or used. Declarative statements that may not be applicable
to all institutions are clearly designated and would not affect the determination of the specific
maturity level.
3
Compensating control - A management, operational, and/or technical control (e.g., safeguard or countermeasure)
employed by an organization in lieu of a recommended security control in the low, moderate, or high baselines
that provides equivalent or comparable protection for an information system.
May 2017 8
FFIEC Cybersecurity Assessment Tool User’s Guide
rises, an institution’s maturity levels should increase. An institution’s inherent risk profile and
maturity levels will change over time as threats, vulnerabilities, and operational environments
change. Thus, management should consider reevaluating its inherent risk profile and
cybersecurity maturity periodically and when planned changes can affect its inherent risk profile
(e.g., launching new products or services, new connections).
Table 3: Risk/Maturity Relationship
Innovative
Cybersecurity Maturity Level for Each
Advanced
Domain
Intermediate
Evolving
Baseline
If management determines that the institution’s maturity levels are not appropriate in relation to
the inherent risk profile, management should consider reducing inherent risk or developing a
strategy to improve the maturity levels. This process includes
• determining target maturity levels.
• conducting a gap analysis.
• prioritizing and planning actions.
• implementing changes.
• reevaluating over time.
• communicating the results.
Management can set target maturity levels for each domain or across domains based on the
institution’s business objectives and risk appetite. Management can conduct a gap analysis
between the current and target maturity levels and initiate improvements based on the gaps. Each
declarative statement can represent a range of strategies and processes that have enterprise-wide
impact. For example, declarative statements not yet attained provide insights for policies,
processes, procedures, and controls that may improve risk management in relation to a specific
risk or the institution’s overall cybersecurity preparedness.
Using the maturity levels in each domain, management can identify potential actions that would
increase the institution’s overall cybersecurity preparedness. Management can review declarative
statements at maturity levels beyond what the institution has achieved to determine the actions
needed to reach the next level and implement changes to address gaps. Management’s periodic
May 2017 9
FFIEC Cybersecurity Assessment Tool User’s Guide
reevaluations of the inherent risk profile and maturity levels may further assist the institution in
maintaining an appropriate level of cybersecurity preparedness. In addition, management may
also seek an independent validation, such as by the internal audit function, of the institution’s
Assessment process and findings.
The Assessment results should be communicated to the chief executive officer (CEO) and board.
More information and questions to consider are contained in the “Overview for Chief Executive
Officers and Boards of Directors.”
Resources
In addition to the “Overview for Chief Executive Officers and Boards of Directors,” the FFIEC
has released the following documents to assist institutions with the Cybersecurity Assessment
Tool.
• Appendix A: Mapping Baseline Statements to FFIEC IT Examination Handbook
• Appendix B: Mapping Cybersecurity Assessment Tool to NIST Cybersecurity Framework
• Appendix C: Glossary
May 2017 10
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Technologies and
Connection Types Least Minimal Moderate Significant Most
Total number of Internet service No connections Minimal complexity Moderate complexity Significant Substantial complexity
provider (ISP) connections (including (1–20 connections) (21–100 connections) complexity (101–200 (>200 connections)
branch connections) connections)
Unsecured external connections, None Few instances of Several instances of Significant instances Substantial instances of
number of connections not users unsecured unsecured of unsecured unsecured connections
(e.g., file transfer protocol (FTP), connections (1–5) connections (6–10) connections (11–25) (>25)
Telnet, rlogin)
Wireless network access No wireless access Separate access Guest and corporate Wireless corporate Wireless corporate
points for guest wireless network network access; network access; all
wireless and access are logically significant number of employees have access;
corporate wireless separated; limited users and access substantial number of
number of users and points (251–1,000 access points (>1,000
access points (1–250 users; 26–100 users; >100 access
users; 1–25 access access points) points)
points)
Personal devices allowed to connect None Only one device type Multiple device types Multiple device types Any device type used;
to the corporate network available; available used; available to used; available to available to >25% of
to <5% of employees <10% of employees <25% of authorized employees (staff,
(staff, executives, (staff, executives, employees (staff, executives, managers)
managers); e-mail managers) and executives, and board; all
access only board; e-mail access managers) and applications accessed
only board; e-mail and
some applications
accessed
Third parties, including number of No third parties and Limited number of Moderate number of Significant number of Substantial number of
organizations and number of no individuals from third parties (1–5) third parties (6–10) third parties (11–25) third parties (>25) and
individuals from vendors and third parties with and limited number and moderate and significant substantial number of
subcontractors, with access to access to systems of individuals from number of individuals number of individuals individuals from third
internal systems (e.g., virtual private third parties (<50) from third parties from third parties parties (>1,500) with
network, modem, intranet, direct with access; low (50–500) with (501–1,500) with access; high complexity
connection) complexity in how access; some access; high level of in how they access
they access systems complexity in how complexity in terms systems
they access systems of how they access
systems
May 2017 11
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Technologies and
Connection Types Least Minimal Moderate Significant Most
Wholesale customers with dedicated None Few dedicated Several dedicated Significant number of Substantial number of
connections connections connections dedicated dedicated connections
(between 1–5) (between 6–10) connections (>25)
(between 11–25)
Internally hosted and developed or No applications Few applications Several applications Significant number of Substantial number of
modified vendor applications (between 1–5) (between 6–10) applications applications and
supporting critical activities (between 11–25) complexity (>25)
Internally hosted, vendor-developed Limited applications Few applications (6– Several applications Significant number of Substantial number of
applications supporting critical (0–5) 30) (31–75) applications (76–200) applications and
activities complexity (>200)
User-developed technologies and No user-developed 1–100 technologies 101–500 501–2,500 >2,500 technologies
user computing that support critical technologies technologies technologies
activities (includes Microsoft Excel
spreadsheets and Access databases
or other user-developed tools)
End-of-life (EOL) systems No systems Few systems that are Several systems that A large number of Majority of critical
(hardware or at risk of EOL and will reach EOL within systems that support operations dependent
software) that are none that support 2 years and some critical operations at on systems that have
past EOL or at risk of critical operations that support critical EOL or are at risk of reached EOL or will
nearing EOL within 2 operations reaching EOL in 2 reach EOL within the
years years next 2 years or an
unknown number of
systems that have
reached EOL
Open Source Software (OSS) No OSS Limited OSS and Several OSS that Large number of Majority of operations
none that support support critical OSS that support dependent on OSS
critical operations operations critical operations
Network devices (e.g., servers, Limited or no network Few devices (250– Several devices Significant number of Substantial number of
routers, and firewalls; include devices (<250) 1,500) (1,501–25,000) devices (25,001– devices (>50,000)
physical and virtual) 50,000)
Third-party service providers storing No third parties that 1–25 third parties 26–100 third parties 101–200 third parties >200 third parties that
and/or processing information that support critical that support critical that support critical that support critical support critical activities;
support critical activities (Do not have activities activities activities activities; 1 or more 1 or more are foreign-
access to internal systems, but the are foreign-based based
institution relies on their services)
May 2017 12
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Technologies and
Connection Types Least Minimal Moderate Significant Most
Cloud computing services hosted No cloud providers Few cloud providers; Several cloud Significant number of Substantial number of
externally to support critical activities private cloud only (1– providers (4–7) cloud providers (8– cloud providers (>10);
3) 10); cloud-provider cloud-provider locations
locations used used include
include international; international; use of
use of public cloud public cloud
Risk Levels
Online presence (customer) No Web-facing Serves as an Serves as a delivery Serves as a delivery Internet applications
applications or social informational Web channel for retail channel for serve as a channel to
media presence site or social media online banking; may wholesale wholesale customers to
page (e.g., provides communicate to customers; may manage large value
branch and ATM customers through include retail account assets
locations and social media origination
marketing materials)
Mobile presence None SMS text alerts or Mobile banking Mobile banking Full functionality,
notices only; application for retail application includes including originating new
browser-based customers (e.g., bill external transfers transactions (e.g., ACH,
access payment, mobile (e.g., for corporate wire)
check capture, clients, recurring
internal transfers external transactions)
only)
Automated Teller Machines (ATM) No ATM services ATM services offered ATM services ATM services ATM services managed
(Operation) but no owned managed by a third managed internally; internally; ATM services
machines party; ATMs at local ATMs at U.S. provided to other
and regional branches and retail financial institutions;
branches; cash locations; cash ATMs at domestic and
reload services reload services international branches
outsourced outsourced and retail locations;
cash reload services
managed internally
May 2017 13
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Online/Mobile Products
and Technology Services Least Minimal Moderate Significant Most
Issue debit or credit cards Do not issue debit or Issue debit and/or Issue debit or credit Issue debit or credit Issue debit or credit
credit cards credit cards through cards through a third cards directly; cards directly; >100,000
a third party; <10,000 party; between between 50,000– cards outstanding; issue
cards outstanding 10,000–50,000 cards 100,000 cards cards on behalf of other
outstanding outstanding financial institutions
Prepaid cards Do not issue prepaid Issue prepaid cards Issue prepaid cards Issue prepaid cards Issue prepaid cards
cards through a third party; through a third party; through a third party; internally, through a
<5,000 cards 5,000–10,000 cards 10,001–20,000 cards third party, or on behalf
outstanding outstanding outstanding of other financial
institutions; >20,000
cards outstanding
Emerging payments technologies Do not accept or use Indirect acceptance Direct acceptance or Direct acceptance or Direct acceptance of
(e.g., digital wallets, mobile wallets) emerging payments or use of emerging use of emerging use of emerging emerging payments
technologies payments payments payments technologies; moderate
technologies technologies; partner technologies; small transaction volume
(customer use may or co-brand with non- transaction volume; and/or foreign payments
affect deposit or bank providers; no foreign payments
credit account) limited transaction
volume
Person-to-person payments (P2P) Not offered Customers allowed Customers allowed to Customers allowed Customers allowed to
to originate originate payments; to originate request payment or to
payments; used by used by 1,000–5,000 payments; used by originate payment; used
<1,000 customers or customers or monthly 5,001–10,000 by >10,000 customers
monthly transaction transaction volume is customers or monthly or monthly transaction
volume is <50,000 between 50,000– transaction volume is volume >1 million
100,000 between 100,001–
1 million
Originating ACH payments No ACH origination Originate ACH Originate ACH debits Sponsor third-party Sponsor nested third-
credits; daily volume and credits; daily payment processor; party payment
<3% of total assets volume is 3%–5% of originate ACH debits processors; originate
total assets and credits with daily debits and credits with
volume 6%–25% of daily volume that is
total assets >25% of total assets
Originating wholesale payments (e.g., Do not originate Daily originated Daily originated Daily originated Daily originated
CHIPS) wholesale payments wholesale payment wholesale payment wholesale payment wholesale payment
volume <3% of total volume 3%–5% of volume 6%–25% of volume >25% of total
assets total assets total assets assets
May 2017 14
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Online/Mobile Products
and Technology Services Least Minimal Moderate Significant Most
Wire transfers Not offered In person wire In person, phone, Multiple request Multiple request
requests only; and fax wire channels (e.g., channels (e.g., online,
domestic wires only; requests; domestic online, text, e-mail, text, e-mail, fax, and
daily wire volume daily wire volume fax, and phone); daily phone); daily domestic
<3% of total assets 3%–5% of total domestic wire wire volume >25% of
assets; international volume 6%–25% of total assets; daily
daily wire volume total assets; daily international wire
<3% of total assets international wire volume >10% of total
volume 3%–10% of assets
total assets
Merchant remote deposit capture Do not offer Merchant <100 merchant 100–500 merchant 501–1,000 merchant >1,000 merchant clients;
(RDC) RDC clients; daily volume clients; daily volume clients; daily volume daily volume of
of transactions is of transactions is of transactions is transactions is >25% of
<3% of total assets 3%–5% of total 6%–25% of total total assets
assets assets
Global remittances Do not offer global Gross daily Gross daily Gross daily Gross daily transaction
remittances transaction volume is transaction volume is transaction volume is volume is >25% of total
<3% of total assets 3%–5% of total 6%–25% of total assets
assets assets
Treasury services and clients No treasury Limited services Services offered Services offered Multiple services offered
management offered; number of include lockbox, ACH include accounts including currency
services are offered clients is <1,000 origination, and receivable solutions services, online
remote deposit and liquidity investing, and
capture; number of management; investment sweep
clients is between number of clients is accounts; number of
1,000–10,000 between 10,001– clients is >20,000
20,000
Trust services Trust services are not Trust services are Trust services Trust services Trust services provided
offered offered through a provided directly; provided directly; directly; assets under
third-party provider; portfolio of assets assets under management total
assets under under management management total >$10 billion
management total total $500 million– $1 billion–$10 billion
<$500 million $999 million
Act as a correspondent bank Do not act as a Act as a Act as a Act as a Act as a correspondent
(Interbank transfers) correspondent bank correspondent bank correspondent bank correspondent bank bank for >500
for <100 institutions for 100–250 for 251–500 institutions
institutions institutions
May 2017 15
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Online/Mobile Products
and Technology Services Least Minimal Moderate Significant Most
Merchant acquirer (sponsor Do not act as a Act as a merchant Act as a merchant Act as a merchant Act as a merchant
merchants or card processor activity merchant acquirer acquirer; <1,000 acquirer; outsource acquirer and card acquirer and card
into the payment system) merchants card payment payment processor; payment processor;
processing; 1,000– 10,001–100,000 >100,000 merchants
10,000 merchants merchants
Host IT services for other Do not provide IT Host or provide IT Host or provide IT Host or provide IT Host or provide IT
organizations (either through joint services for other services for affiliated services for up to 25 services for 26–50 services for >50
systems or administrative support) organizations organizations unaffiliated unaffiliated unaffiliated
organizations organizations organizations
Risk Levels
Category: Organizational
Characteristics Least Minimal Moderate Significant Most
Mergers and acquisitions (including None planned Open to initiating In discussions with A sale or acquisition Multiple ongoing
divestitures and joint ventures) discussions or at least 1 party has been publicly integrations of
actively seeking a announced within the acquisitions are in
merger or acquisition past year, in process
negotiations with 1 or
more parties
Direct employees (including Number of Number of Number of Number of employees Number of employees is
information technology and employees totals <50 employees totals 50– employees totals totals 10,001–50,000 >50,000
cybersecurity contractors) 2,000 2,001–10,000
Changes in IT and information Key positions filled; Staff vacancies exist Some turnover in Frequent turnover in Vacancies in senior or
security staffing low or no turnover of for non-critical roles key or senior key staff or senior key positions for long
personnel positions positions periods; high level of
employee turnover in IT
or information security
Privileged access (Administrators– Limited number of Level of turnover in Level of turnover in High reliance on High employee turnover
network, database, applications, administrators; administrators does administrators external in network
systems, etc.) limited or no external not affect operations affects operations; administrators; administrators; many or
administrators or activities; may number of number of most administrators are
utilize some external administrators for administrators is not external (contractors or
administrators individual systems or sufficient to support vendors); experience in
applications exceeds level or pace of network administration
what is necessary change is limited
May 2017 16
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
Category: Organizational
Characteristics Least Minimal Moderate Significant Most
Changes in IT environment (e.g., Stable IT Infrequent or minimal Frequent adoption of Volume of significant Substantial change in
network, infrastructure, critical environment changes in the IT new technologies changes is high outsourced provider(s)
applications, technologies supporting environment of critical IT services;
new products or services) large and complex
changes to the
environment occur
frequently
Locations of operations/data centers 1 state 1 region 1 country 1–10 countries >10 countries
Risk Levels
Attempted cyber attacks No attempted attacks Few attempts Several attempts Significant number of Substantial number of
or reconnaissance monthly (<100); may monthly (100– 500); attempts monthly attempts monthly
have had generic phishing campaigns (501–100,000); spear (>100,000); persistent
phishing campaigns targeting employees phishing campaigns attempts to attack senior
received by or customers at the targeting high net management and/or
employees and institution or third worth customers and network administrators;
customers parties supporting employees at the frequently targeted for
critical activities; may institution or third DDoS attacks
have experienced an parties supporting
attempted Distributed critical activities;
Denial of Service Institution specifically
(DDoS) attack within is named in threat
the last year reports; may have
experienced multiple
attempted DDoS
attacks within the last
year
May 2017 17
FFIEC Cybersecurity Assessment Tool Inherent Risk Profile
Risk Levels
May 2017 18
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Cybersecurity Maturity
Evolving At least annually, the board or an appropriate board committee reviews and
approves the institution’s cybersecurity program.
Cybersecurity tools and staff are requested through the budget process.
The standard board meeting package includes reports and metrics that go
beyond events and incidents to address threat intelligence trends and the
institution’s security posture.
The institution has a cyber risk appetite statement approved by the board or
an appropriate board committee.
Cyber risks that exceed the risk appetite are escalated to management.
May 2017 19
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
The budget process for requesting additional cybersecurity staff and tools is
integrated into business units’ budget processes.
Advanced The board or board committee approved cyber risk appetite statement is
part of the enterprise-wide risk appetite statement.
The budget process for requesting additional cybersecurity staff and tools
maps current resources and tools to the cybersecurity strategy.
May 2017 20
STRATEGY/ POLICIES FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
The institution has policies commensurate with its risk and complexity that
address the concepts of information technology risk management. (FFIEC
Information Security Booklet, page, 16)
The institution has policies commensurate with its risk and complexity that
address the concepts of threat information sharing. (FFIEC E-Banking
Booklet, page 28)
The institution has board-approved policies commensurate with its risk and
complexity that address information security. (FFIEC Information Security
Booklet, page 16)
The institution has policies commensurate with its risk and complexity that
address the concepts of external dependency or third-party management.
(FFIEC Outsourcing Booklet, page 2)
The institution has policies commensurate with its risk and complexity that
address the concepts of incident response and resilience. (FFIEC
Information Security Booklet, page 83)
Intermediate The institution has a comprehensive set of policies commensurate with its
risk and complexity that address the concepts of threat intelligence.
May 2017 21
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Innovative The cybersecurity strategy identifies and communicates the institution’s role
as it relates to other critical infrastructures.
IT ASSET MANAGEMENT
May 2017 22
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Management monitors moderate and high residual risk issues from the
cybersecurity risk assessment until items are addressed.
Intermediate The cybersecurity function has a clear reporting line that does not present a
conflict of interest.
May 2017 23
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
The cyber risk data aggregation and real-time reporting capabilities support
the institution’s ongoing reporting needs, particularly during cyber incidents.
Evolving Risk assessments are used to identify the cybersecurity risks stemming
from new products, services, or relationships.
The risk assessment considers the risk of using EOL software and
hardware components.
Intermediate The risk assessment is adjusted to consider widely known risks or risk
management practices.
May 2017 24
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Innovative The risk assessment is updated in real time as changes to the risk profile
occur, new applicable standards are released or updated, and new
exposures are anticipated.
Evolving The independent audit function validates that the risk management
function is commensurate with the institution’s risk and complexity.
May 2017 25
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Intermediate A formal process is in place for the independent audit function to update its
procedures based on changes to the institution’s inherent risk profile.
Advanced A formal process is in place for the independent audit function to update its
procedures based on changes to the evolving threat landscape across the
sector.
The independent audit function regularly reviews the institution’s cyber risk
appetite statement in comparison to assessment results and incorporates
gaps into the audit strategy.
Innovative A formal process is in place for the independent audit function to update its
procedures based on changes to the evolving threat landscape across
other sectors the institution depends upon.
Baseline Information security roles and responsibilities have been identified. (FFIEC
Information Security Booklet, page 7)
May 2017 26
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Evolving A formal process is used to identify cybersecurity tools and expertise that
may be needed.
Intermediate The institution has a program for talent recruitment, retention, and
succession planning for the cybersecurity and resilience staffs.
Innovative The institution actively partners with industry associations and academia to
inform curricula based on future cybersecurity staffing needs of the
industry.
May 2017 27
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
Evolving The institution has a program for continuing cybersecurity training and skill
development for cybersecurity staff.
The institution routinely updates its training to security staff to adapt to new
threats.
Innovative Key performance indicators are used to determine whether training and
awareness programs positively influence behavior.
CULTURE
Evolving The institution has formal standards of conduct that hold all employees
accountable for complying with cybersecurity policies and procedures.
May 2017 28
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 1
The risk culture requires formal consideration of cyber risks in all business
decisions.
Innovative The institution leads efforts to promote cybersecurity culture across the
sector and to other sectors that they depend upon.
May 2017 29
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 2
Protocols are implemented for collecting information from industry peers and
government.
Innovative A threat analysis system automatically correlates threat data to specific risks
and then takes risk-based automated actions while alerting management.
May 2017 30
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 2
Computer event logs are used for investigations once an event has
occurred. (FFIEC Information Security Booklet, page 83)
Intermediate A threat intelligence team is in place that evaluates threat intelligence from
multiple sources for credibility, relevance, and exposure.
A profile is created for each threat that identifies the likely intent, capability,
and target of the threat.
Threat information sources that address all components of the threat profile
are prioritized and monitored.
Threat intelligence is viewed within the context of the institution's risk profile
and risk appetite to prioritize mitigating actions in anticipation of threats.
May 2017 31
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 2
Innovative The institution uses multiple sources of intelligence, correlated log analysis,
alerts, internal traffic flows, and geopolitical events to predict potential future
attacks and attack trends.
Highest risk scenarios are used to predict threats against specific business
targets.
Baseline Information security threats are gathered and shared with applicable internal
employees. (FFIEC Information Security Booklet, page 83)
Evolving A formal and secure process is in place to share threat and vulnerability
information with other entities.
Intermediate A formal protocol is in place for sharing threat, vulnerability, and incident
information to employees based on their specific job function.
May 2017 32
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 2
Innovative A mechanism is in place for sharing cyber threat intelligence with business
units in real time including the potential financial and operational impact of
inaction.
May 2017 33
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Baseline Network perimeter defense tools (e.g., border router and firewall) are
used. (FFIEC Information Security Booklet, page 33)
Systems that are accessed from the Internet or by external parties are
protected by firewalls or other similar devices. (FFIEC Information
Security Booklet, page 46)
All ports are monitored. (FFIEC Information Security Booklet, page 50)
Programs that can override system, object, network, virtual machine, and
application controls are restricted. (FFIEC Information Security Booklet,
page 41)
May 2017 34
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Guest wireless networks are fully segregated from the internal network(s).
(*N/A if there are no wireless networks.)
Wireless networks use strong encryption with encryption keys that are
changed frequently. (*N/A if there are no wireless networks.)
Advanced Network environments and virtual instances are designed and configured
to restrict and monitor traffic between trusted and untrusted zones.
Only one primary function is permitted per server to prevent functions that
require different security levels from co-existing on the same server.
Innovative The institution risk scores all of its infrastructure assets and updates in
real time based on threats, vulnerabilities, or operational changes.
The institution proactively seeks to identify control gaps that may be used
as part of a zero-day attack.
May 2017 35
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
User access reviews are performed periodically for all systems and
applications based on the risk to the application or system. (FFIEC
Information Security Booklet, page 18)
Changes to physical and logical user access, including those that result
from voluntary and involuntary terminations, are submitted to and
approved by appropriate personnel. (FFIEC Information Security Booklet,
page 18)
May 2017 36
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Administrators have two accounts: one for administrative use and one for
general purpose, non-administrative tasks.
May 2017 37
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
May 2017 38
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Baseline Controls are in place to restrict the use of removable media to authorized
personnel. (FFIEC Information Security Work Program, Objective I: 4-1)
Mobile devices with access to the institution’s data are centrally managed
for antivirus and patch deployment. (*N/A if mobile devices are not used.)
Intermediate Data loss prevention controls or devices are implemented for inbound
and outbound communications (e.g., e-mail, FTP, Telnet, prevention of
large file transfers).
May 2017 39
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Advanced Employees’ and third parties’ devices (including mobile) without the latest
security patches are quarantined and patched before the device is
granted access to the network.
Baseline Developers working for the institution follow secure program coding
practices, as part of a system development life cycle (SDLC), that meet
industry standards. (FFIEC Information Security Booklet, page 56)
Evolving Security testing occurs at all post-design phases of the SDLC for all
applications, including mobile applications. (*N/A if there is no software
development.)
Software code executables and scripts are digitally signed to confirm the
software author and guarantee that the code has not been altered or
corrupted.
May 2017 40
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
identified.
E-mail protection mechanisms are used to filter for common cyber threats
(e.g., attached malware or malicious links). (FFIEC Information Security
Booklet, page 39)
Processes are in place to monitor potential insider activity that could lead
to data theft or destruction.
Intermediate Audit or risk management resources review the penetration testing scope
and results to help determine the need for rotating companies based on
the quality of the work.
May 2017 41
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Innovative User tasks and content (e.g., opening an e-mail attachment) are
automatically isolated in a secure container or virtual environment so that
malware can be analyzed but cannot access vital data, end-point
operating systems, or applications on the institution’s network.
May 2017 42
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Tools actively monitor security logs for anomalous behavior and alert
within established parameters.
Anomalous activity and other network and system alerts are correlated
across business units to detect and prevent multifaceted attacks (e.g.,
simultaneous account takeover and DDoS attack).
Advanced An automated tool triggers system and/or fraud alerts when customer
logins occur within a short period of time but from physically distant IP
locations.
Innovative The institution has a mechanism for real-time automated risk scoring of
threats.
May 2017 43
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
EVENT DETECTION Baseline A normal network activity baseline is established. (FFIEC Information
Security Booklet, page 77)
Mechanisms (e.g., antivirus alerts, log event alerts) are in place to alert
management to potential attacks. (FFIEC Information Security Booklet,
page 78)
Intermediate Controls or tools (e.g., data loss prevention) are in place to detect
potential unauthorized or unintentional transmissions of confidential data.
Innovative The institution is leading efforts to develop event detection systems that
will correlate in real time when events are about to occur.
May 2017 44
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
Evolving A formal process is in place to acquire, test, and deploy software patches
based on criticality.
Intermediate Patches for high-risk vulnerabilities are tested and applied when released
or the risk is accepted and accountability assigned.
May 2017 45
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 3
REMEDIATION Baseline Issues identified in assessments are prioritized and resolved based on
criticality and within the time frames established in the response to the
assessment report. (FFIEC Information Security Booklet, page 87)
Advanced All medium and high risk issues identified in penetration testing,
vulnerability scanning, and other independent testing are escalated to the
board or an appropriate board committee for risk acceptance if not
resolved in a timely manner.
May 2017 46
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 4
Evolving Critical business processes have been mapped to the supporting external
connections.
May 2017 47
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 4
May 2017 48
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 4
CONTRACTS Baseline Formal contracts that address relevant security and privacy
requirements are in place for all third parties that process, store, or
transmit confidential data or provide critical services. (FFIEC
Information Security Booklet, page 7)
Intermediate Third-party SLAs or similar means are in place that require timely
notification of security events.
May 2017 49
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 4
ONGOING MONITORING Baseline The third-party risk assessment is updated regularly. (FFIEC
Outsourcing Booklet, page 3)
Innovative The institution is leading efforts to develop new auditable processes for
ongoing monitoring of cybersecurity risks posed by third parties.
May 2017 50
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
Baseline The institution has documented how it will react and respond to cyber
incidents. (FFIEC Business Continuity Planning Booklet, page 4)
A formal backup and recovery plan exists for all critical business lines.
(FFIEC Business Continuity Planning Booklet, page 4)
Evolving The remediation plan and process outlines the mitigating actions,
resources, and time parameters.
May 2017 51
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
Advanced Methods for responding to and recovering from cyber incidents are
tightly woven throughout the business units’ disaster recovery,
business continuity, and crisis management plans.
May 2017 52
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
The results of cyber event exercises are used to improve the incident
response plan and automated triggers.
Innovative The institution tests the ability to shift business processes or functions
between different processing centers or technology systems for cyber
incidents without interruption to business or loss of productivity or
data.
May 2017 53
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
Tools and processes are in place to detect, alert, and trigger the incident
response program. (FFIEC Information Security Booklet, page 84)
Evolving The institution has processes to detect and alert the incident response
team when potential insider activity manifests that could lead to data theft
or destruction.
The institution has the ability to discover infiltration, before the attacker
traverses across systems, establishes a foothold, steals information, or
causes damage to data and systems.
Network and system alerts are correlated across business units to better
detect and prevent multifaceted attacks (e.g., simultaneous DDoS attack
and account takeover).
Advanced Sophisticated and adaptive technologies are deployed that can detect and
alert the incident response team of specific tasks when threat indicators
across the enterprise indicate potential external and internal threats.
Innovative The institution is able to detect and block zero-day attempts and inform
management and the incident response team in real time.
May 2017 54
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
RESPONSE AND MITIGATION Baseline Appropriate steps are taken to contain and control an incident to prevent
further unauthorized access to or use of customer information. (FFIEC
Information Security Booklet, page 84)
Advanced The incident management function collaborates effectively with the cyber
threat intelligence function during an incident.
May 2017 55
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
Baseline A process exists to contact personnel who are responsible for analyzing
and responding to an incident. (FFIEC Information Security Booklet,
page 83)
Tracked cyber incidents are correlated for trend analysis and reporting.
Intermediate Employees that are essential to mitigate the risk (e.g., fraud, business
resilience) know their role in incident escalation.
Advanced The institution has established quantitative and qualitative metrics for the
cybersecurity incident response process.
May 2017 56
FFIEC Cybersecurity Assessment Tool Cybersecurity Maturity: Domain 5
May 2017 57
FFIEC Cybersecurity Assessment Tool ver.1.1 Mapping Baseline Statements
to FFIEC IT Examination Handbook
The mapping is by Domain, then by Assessment Factor and Category. Each statement is then
sourced to its origin in an applicable FFIEC IT Examination Handbook. Refer to the last page of
this appendix for the Source reference key.
Source: IS.I:pg3 The board, or designated board committee, should be responsible for overseeing
tThe development, implementation, and maintenance of the institution’s information security program
and holding senior management accountable for its actions.
IS.I:pg4: The board should provide management with its expectations and requirements and hold
management accountable for central oversight and coordination, assignment of responsibility, and
effectiveness of the information security program.
IS.WP.2.3: Determine whether the board holds management accountable for the following: Central
oversight and coordination, Assignment of responsibility, Support of the information security
program, and Effectiveness of the information security program.
MGT.WP.2: Determine whether the board of directors oversees and senior management
appropriately establishes an effective governance structure that includes oversight of IT activities.
MGT.WP.2.2.g: Review whether the board or a committee of the board appropriately holds
management accountable for the identification, measurement, and mitigation of IT risks.
Governance/Oversight: The budgeting process includes information security related expenses and
tools.
Source: IS.I.C:pg5: Funding, along with technical and managerial talent, also contributes to the
effectiveness of the information security program. Management should provide, and the board
should oversee, adequate funding to develop, implement, and maintain a successful information
security program.
IS.WP.2.9: Determine whether the board provides adequate funding to develop and implement a
successful information security function.
MGT.I.B.6:pg14: Management should strive to achieve a planning process that constantly adjusts
for new risks or opportunities and maximizes IT’s value.
MGT.I.B.6(c):pg17 When considering new IT projects, management should look at the entry costs
of the technology and the post-implementation support costs.
MGT.I.B.6(c):pg17: Some institutions budget IT as a separate department. A financial analysis of
an IT department should include a comparison of the cost-effectiveness of the in-house operation
versus contracting with a third-party provider. The analysis may also include a peer group
comparison of operating costs and ratios.
MGT.WP.4: Determine the adequacy of the institution's IT operations planning and investment.
Assess the adequacy of the risk assessment and the overall alignment with the institution's
business strategy, including planning for IT resources and budgeting.
Governance/Strategy-Policies: The institution has policies commensurate with its risk and complexity
that address the concepts of information technology risk management.
Governance/Strategy-Policies: The institution has policies commensurate with its risk and complexity
that address the concepts of external dependency or third-party management.
Source: OT.B.2: Financial institutions should have a comprehensive outsourcing risk management
process to govern their TSP relationships.
Governance/Strategy-Policies: The institution has policies commensurate with its risk and complexity
that address the concepts of incident response and resilience.
Source: IS.II.C.21:pg43: Management should do the following: … Establish and maintain policies
that address the concepts of information security incident response and resilience, and test
information security incident scenarios.
IS.Wp.6.34.c: Determine whether management effectively manages the following information
security considerations related to business continuity planning. Review management’s ability
to do the following: Develop policies that address the concepts of information security incident
response and resilience and test information security incident scenarios.
Risk Management/Risk Assessment: The risk assessment is updated to address new technologies,
products, services, and connections before deployment.
Source: IS.II.A:pg7: External events affecting IT and the institution’s ability to meet its operating
objectives include natural disasters, cyber attacks, changes in market conditions, new
competitors, new technologies, litigation, and new laws or regulations. These events pose risks
and opportunities, and the institution should factor them into the risk identification process.
IS.II.C:pg11: Additionally, management should develop, maintain, and update a repository of
cybersecurity threat and vulnerability information that may be used in conducting risk assessments
and provide updates to senior management and the board on cyber risk trends.
IS.WP.8.3.d: Determine whether management has effective threat identification and assessment
processes, including the following: Using threat knowledge to drive risk assessment and response.
Risk Management/Audit: The independent audit function validates controls related to the storage or
transmission of confidential data.
Source: AUD.B.1: An effective IT audit program should… promote the confidentiality, integrity, and
availability of information systems.
MGT.WP.5.5: Determine whether the financial institution has a process to ensure that staff has the
requisite expertise to fulfill its roles. Review the adequacy of the process.
Training and Culture/Training: Annual information security training includes incident response,
current cyber threats (e.g., phishing, spear phishing, social engineering, and mobile security), and
emerging issues.
Source: IS.II.C.7(e):pg17: Training materials for most users focus on issues such as end-point
security, log-in requirements, and password administration guidelines. Training programs should
include scenarios capturing areas of significant and growing concern, such as phishing and social
engineering attempts, loss of data through e-mail or removable media, or unintentional posting of
confidential or proprietary information on social media.
IS.WP.6.8.f: Determine whether management effectively mitigates risks posed by users. Review
whether management does the following: Provides training to support awareness and policy
compliance.
Training and Culture/Training: Customer awareness materials are readily available (e.g., DHS’
Cybersecurity Awareness Month materials).
Source: IS.II.C.16:pg36: Beyond authentication, remote access controls should
include additional layered security controls and may include some combination of the
following: Customer education to increase awareness of the fraud risk and effective
techniques customers can use to mitigate the risk.
IS.II.C.16(a): pg37: The institution’s customer awareness and education efforts should
consider both retail and commercial account holders.
IS.WP.6.26: Determine whether management develops customer awareness and education
efforts that address both retail (consumer) and commercial account holders.
Training and Culture/Culture: Management holds employees accountable for complying with the
information security program.
Source: IS.II.C.7(e):pg17: Management should hold all employees, officers, and contractors
accountable for complying with security and acceptable use policies and should ensure that the
institution’s information and other assets are protected.
MGT.III.C.2:pg28: Management should require periodic acknowledgement of acceptable use
policies for the network, software applications, Internet, e-mail, confidential data, and social
media. Information security awareness and training programs help support information security
and other management policies.
MGT.WP.12.5: Determine whether management has effective hiring and training practices that
include the following:
d. Requiring periodic acknowledgement of acceptable use policies.
e. Obtaining signed confidentiality and nondisclosure agreements.
f. Providing information security awareness and training programs.
Source: IS.III.A:pg48: Once a threat is identified and potential vulnerabilities are assessed, the
significance of the threat should trigger a response. The response should be commensurate with the
risk posed by the threat and should include remediation options. Management should design policies
to allow for immediate and consequential threats to be dealt with expeditiously, while less significant
threats are addressed as part of a broader risk management process. When management receives
vulnerability information from external individuals or groups, management should have appropriate
processes and procedures to evaluate the credibility of the information to appropriately address it.
IS.WP.8.3.a.d: Determine whether management has effective threat identification and
assessment processes, including the following: Maintaining procedures for obtaining,
monitoring, assessing, and responding to evolving threat and vulnerability information….Using
threat knowledge to drive risk assessment and response.
Monitoring and Analyzing/Monitoring and Analyzing: Audit log records and other security event
logs are reviewed and retained in a secure manner.
Source: IS.II.C.22:pg44: Management should have effective log retention policies that address
the significance of maintaining logs for incident response and analysis needs. …Additionally,
logging practices should be reviewed periodically by an independent party to ensure appropriate
log management. … Regardless of the method of log management, management should
develop processes to collect, aggregate, analyze, and correlate security information.
IS.WP.6.35: Determine whether management has an effective log management process that
involves a central logging repository, timely transmission of log files, and effective log analysis.
Monitoring and Analyzing/Monitoring and Analyzing: Computer event logs are used for
investigations once an event has occurred.
Source: IS.II.C.22:pg44: Log files are critical to the successful investigation and prosecution of
security incidents and can potentially contain sensitive information… Security information and
event management (SIEM) systems can provide a method for management to collect,
aggregate, analyze, and correlate information from discrete systems and applications.
Management can use SIEM systems to discern trends and identify potential information security
incidents.
IS.WP.6.35: Determine whether management has an effective log management process that
involves a central logging repository, timely transmission of log files, and effective log analysis.
Review whether management has the following: (d) Processes to effectively collect, aggregate,
analyze, and correlate security event information from discrete systems and applications.
Information Sharing/Information Sharing: Contact information for law enforcement and the
regulator(s) is maintained and updated regularly.
Source: BCP.WP.I.5.1: Include(s) emergency preparedness and crisis management plans
that…Include an accurate contact tree, as well as primary and emergency contact information, for
communicating with employees, service providers, vendors, regulators, municipal authorities, and
emergency response personnel.
IS.III.D:pg.51: Primary considerations for incident response include the following: Protocols to define
when and under what circumstances to notify and involve regulators, customers, and law
enforcement, including names and contact information for each group.
MGT.III.C.3:pg29: Develop a policy for escalating and reporting security incidents to the board,
government agencies, law enforcement, and the institution’s primary federal and state regulator
based on thresholds defined by the financial institution and applicable legal requirements. Relevant
thresholds could include significant financial impact, significant operational downtime, operational or
system breach, or loss of critical infrastructure.
MGT.WP.12.8.i: Developing a policy for escalating and reporting security incidents to the board,
government agencies, law enforcement, and the institution’s primary federal and state regulators
based on thresholds defined by the financial institution.
Information Sharing/Information Sharing: Information about threats is shared with law enforcement
and regulators when required or prompted.
Source: IS.III.D:pg.51: Primary considerations for incident response include the following: How,
when, and what to communicate outside of the institution, whether to law enforcement, regulatory
agencies, information-sharing organizations, customers, third-party service providers, potential
victims, or others.
MGT.III.C.3:pg29: Develop a policy for escalating and reporting security incidents to the board,
government agencies, law enforcement, and the institution’s primary federal and state regulator
based on thresholds defined by the financial institution and applicable legal requirements. Relevant
thresholds could include significant financial impact, significant operational downtime, operational or
system breach, or loss of critical infrastructure.
MGT.WP.12.8.i: Developing a policy for escalating and reporting security incidents to the
board, government agencies, law enforcement, and the institution’s primary federal and
state regulators based on thresholds defined by the financial institution.
Preventive Controls/Infrastructure Management: Systems that are accessed from the Internet or by
external parties are protected by firewalls or other similar devices.
Source: IS.II.C.17:pg39: Protect web or Internet-facing applications through additional controls,
including web application firewalls, regular scanning for new or recurring vulnerabilities, mitigation
or remediation of common security weaknesses, and network segregation to limit inappropriate
access or connections to the application or other areas of the network.
IS.WP.6.27(g): Review whether applications in use provide the following capabilities: Protect web
or Internet-facing applications through additional controls, including web application firewalls,
regular scanning for new or recurring vulnerabilities, mitigation or remediation of common security
weaknesses, and network segregation.
OPS.B.23: Transmission controls should address both physical and logical risks. In large, complex
institutions, management should consider segregating wide area networks (WAN) and local area
networks (LAN) segments with firewalls that restrict access as well as the content of inbound and
outbound traffic.
OPS.WP.8.1: Determine whether management has implemented appropriate daily operational
controls and processes including… alignment of telecommunication architecture and process with
the strategic plan.
MGT.III.C.3:pg29: Conduct initial due diligence and ongoing monitoring to fully understand the types
of connections and mitigating controls in place between the financial institution and its third- party
providers.
Preventive Controls/Access and Data Management: Employee access is granted to systems and
confidential data based on job responsibilities and the principles of least privilege.
Source: IS.II.C.7:pg15: Users should be granted access to systems, applications, and databases
based on their job responsibilities.
IS.II.C.10(b):pg23: Hardening can include the following actions: … Configuring privilege and
access controls by first denying all, then granting back the minimum necessary to each user (i.e.,
enforcing the principle of least privilege).
IS.WP.6.13: Determine whether management has processes to harden applications and systems
(e.g., installing minimum services, installing necessary patches, configuring appropriate security
settings, enforcing principle of least privilege, changing default passwords, and enabling logging).
MGT.III.C.2:pg28: Management should document and confirm access privileges for each staff
member based on his or her job description.
Preventive Controls/Access and Data Management: Employee access to systems and confidential
data provides for separation of duties.
Source: IS.II.C.7:pg15: Management should mitigate the risks posed by users by doing the
following: Employing segregation of duties.
IS.WP.2.5.g: Determine whether management responsibilities are appropriate and include the
following: …Establishment of appropriate segregation of duties.
Preventive Controls/Access and Data Management: Identification and authentication are required
and managed for access to systems, applications, and hardware.
Source: ISIS.II.C.15(b):pg33: Management should implement effective application access
controls by doing the following: Implementing a robust authentication method consistent with the
criticality and sensitivity of the application.
IS.WP.6.22: Determine whether management controls access to applications. Review whether
management does the following: Implements a robust authentication method consistent with the
criticality and sensitivity of the application
Preventive Controls/Access and Data Management: Access controls include password complexity
and limits to password attempts and reuse.
Source: IS.II.C.7:pg15: Access rights should be granted in accordance with the
institution’s physical and logical access control policies.
IS.WP.8.1.k: Determine whether the institution’s security operations activities include the following:
Enforcement of access controls and logical access control policies.
Preventive Controls/Access and Data Management: Physical security controls are used to prevent
unauthorized access to information systems and telecommunication systems.
Source: IS.II.C.8:pg18: Management should implement appropriate preventive, detective, and
corrective controls for physical security. Physical access and damage or destruction to physical
components can impair the confidentiality, integrity, and availability of information. Management
should implement appropriate preventive, detective, and corrective controls for mitigating the risks
inherent to those physical security zones.
IS.WP.6.9: Determine whether management applies appropriate physical security controls to
protect its premises and more sensitive areas, such as its data center(s).
Preventive Controls/Access and Data Management: Mobile devices (e.g., laptops, tablets, and
removable media) are encrypted if used to store confidential data. (*N/A if mobile devices are not
used).
Source: IS.II.C.13(a):pg27: Data storage in portable devices, such as laptops, smart phones, and
tablets, poses unique problems….Risk mitigation typically involves data encryption.
IS.WP.6.30: Determine how and where management uses encryption and if the type and strength
are sufficient to protect information appropriately.
Preventive Controls/Access and Data Management: Data are disposed of or destroyed according to
documented requirements and within expected time frames.
Source: IS.II.C.13(c):pg28: The institution should base its disposal policies on the sensitivity of
the information. Policies, procedures, and training should inform employees about what
actions should be taken to securely dispose of computer-based media and protect the data
from the risks of reconstruction.
IS.WP.6.18.e: Determine whether management maintains policies and effectively controls and
protects access to and transmission of information to avoid loss or damage. Review whether
management does the following:…Has appropriate disposal procedures for both paper-based and
electronic information.
Preventive Controls/Device-End Point Security: Controls are in place to restrict the use of
removable media to authorized personnel.
Source: IS.II.C.13(a):pg27: Management should implement appropriate controls (such as the
use of a DLP program) over portable devices and the sensitive information contained on them.
IS.II.C.13(d):pg29: Management should implement policies for maintaining the security of
physical media (including backup tapes) containing sensitive information while in transit,
including to off-site storage, or when shared with third parties…. Use of adequate encryption of
sensitive information recorded on media that is being physically transported.
IS.WP.6.18: Determine whether management maintains policies and effectively controls
and protects access to and transmission of information to avoid loss or damage. Review
whether management does the following: Requires secure storage of all types of sensitive
information, whether on computer systems, portable devices, physical media, or hard-copy
documents.
Preventive Controls/Secure Coding: The security controls of internally developed software are
periodically reviewed and tested. (*N/A if there is no software development.).
Source: IS.II.C.10:pg21: The process for introducing software should encompass securely
developing, implementing, and testing changes to both internally developed and acquired
software.
IS.WP.6.15: Determine whether management has a process to update and patch operating
systems, network devices, and software applications, including internally developed software
provided to customers, for newly discovered vulnerabilities.
MGT.III.C.5:pg31: Testing, which should include tests of security, validates that equipment and
systems function properly and produce the desired results. As part of the testing process,
management should verify whether new technology systems operate effectively with other
technology components, including vendor-supplied technology. Management should conduct
retesting periodically to help manage risk exposure on an ongoing basis.
MGT.WP.12.10. Determine whether management assesses and mitigates the operational risks
associated with the development or acquisition of software. Appropriate management of the risks
should include the following:
a. Policies documenting risk management controls for the development and acquisition of
systems.
b. System development life cycle or similar methodology based on the complexity and type of
development performed.
c. Tests of new technology, systems, and products before deployment to validate functionality,
controls, and interoperability.
Preventive Controls/Secure Coding: Intellectual property and production code are held in escrow.
(*N/A if there is no production code to hold in escrow.)
Source: D&A.B.39: In addition to ensuring access to current documentation, organizations should
consider protecting their escrow rights by contractually requiring software vendors to inform the
organization if the software vendor pledges the software as loan collateral.
D&A.WP.6.1: Assess the adequacy of acquisition activities by evaluating… The adequacy of
contract and licensing provisions that address… Source-code accessibility/escrow assertions.
Source: ISIS.II.C.17:pg38: To verify the controls have been developed and implemented
appropriately, management should perform appropriate tests (e.g., penetration tests, vulnerability
assessments, and application security tests) before launching or making significant changes to
external-facing applications.
IS.WP.4.2.d: Review whether management has the following: A validation of the risk identification
process through audits, self-assessments, penetration tests, and vulnerability assessments.
MGT.III.C.3:pg29: Perform penetration tests before launching or making significant changes to
critical systems, including Internet- and client-facing applications. Management should review all
findings and develop processes to ensure the timely remediation of issues identified by the tests.
MGT.WP.12.8.f: Determine whether, as part of the institution’s information security program, the
board of directors oversees and management establishes a control structure that is intended to
specifically address cybersecurity risks and includes the following: Performing penetration tests
before launching new or making significant changes to existing Internet- and client-facing
applications and remediating findings from the tests.
Detective Controls/Threat and Vulnerability Detection: Firewall rules are audited or verified at least
quarterly.
Source: IS.III:pg46: Security operations activities can include the following: Security software and
device management (e.g., maintaining the signatures on signature-based devices and firewall
rules).
IS.WP.8.1.a: Determine whether the institution’s security operations activities include the following:
Security software and device management (e.g., maintaining the signatures on signature-based
devices and firewall rules).
Detective Controls/Threat and Vulnerability Detection: E-mail protection mechanisms are used to
filter for common cyber threats (e.g., attached malware or malicious links).
Source: IS.II.C.12:pg26: Management should implement defense-in-depth to protect, detect, and
respond to malware. The institution can use many tools to block malware before it enters the
environment and to detect it and respond if it is not blocked.
IS.WP.6.17: Determine whether management has implemented defense-in-depth to protect,
detect, and respond to malware.
Detective Controls/Event Detection: Mechanisms (e.g., anti-virus alerts, log event alerts) are in
place to alert management to potential attacks.
Source: IS.III.B:pg48: Threat monitoring policies should provide for continual and ad hoc monitoring
of threat intelligence communications and systems, effective incident detection and response, and
the use of monitoring reports in subsequent legal procedures…. Threat monitoring should address
indicators of vulnerabilities, attacks, compromised systems, and suspicious users, such as those
who do not comply with or seek to evade security policies.
IS.WP.8.5: Determine whether management has effective incident identification and assessment
processes to do the following:
e. Escalate the event consistent with the classification.
f. Report internally and externally as appropriate.
Detective Controls/Event Detection: Processes are in place to monitor for the presence of
unauthorized users, devices, connections, and software.
Source: IS.Introduction:pg2: Aligns the information security program with the enterprise risk
management program and identifies, measures, mitigates, and monitors risk….Management
should be able to identify and characterize the threats, assess the risks, make decisions regarding
the implementation of appropriate controls, and provide appropriate monitoring and reporting.
Corrective Controls/Patch Management: Patches are tested before being applied to systems and/or
software.
Source: OPS.B.22: Management should establish procedures to stay abreast of patches, to test
them in a segregated environment, and to install them when appropriate.
OPS.WP.5.1: Determine whether management has implemented and effectively utilizes
operational control programs, processes, and tools such as… Project, change, and patch
management.
Corrective Controls/Patch Management: Patch management reports are reviewed and reflect
missing security patches.
Source: D&A.B.50: Patch management standards should include procedures for identifying,
evaluating, approving, testing, installing, and documenting patches…Organizations should have
procedures in place to identify available patches and to acquire them from trusted sources.
Relationship Management/Contracts: Formal contracts that address relevant security and privacy
requirements are in place for all third parties that process, store, or transmit confidential data or provide
critical services.
Source: IS.II.C.20:pg42: If the third-party service provider stores, transmits, processes, or
disposes of customer information, management should require third- party service providers by
contract to implement appropriate measures designed to meet the Information Security
Standards.
IS.WP.6.31(c): Determine whether management appropriately oversees the effectiveness of
information security controls over outsourced operations and is accountable for the mitigation of
risks involved with the use of third-party service providers. Review the due diligence involved,
security controls to mitigate risk, and monitoring capabilities over the institution’s third parties.
Review the institution’s policies, standards, and procedures related to the use of the following:
…Contractual assurances from third-party service providers for security responsibilities, controls,
and reporting.
MGT.III.C.8:pg35: Third parties should support the responsibilities of their financial institution
clients to adhere to all applicable laws, regulations, and supervisory guidance .
MGT.III.C.8:pg35: When financial institution management contracts with third-party providers for
some or all IT services, it should ensure that controls over outsourced activities provide the
institution with the same level of assurance as controls over those activities performed in-house.
Relationship Management/Contracts: Contracts acknowledge that the third party is responsible for the
security of the institution’s confidential data that it possesses, stores, processes, or transmits.
Source: IS.II.C.20:pg42: Management should oversee outsourced operations through the
following: Contractual assurances for security responsibilities, controls, and reporting.
Relationship Management/Contracts: Contracts specify the security requirements for the return or
destruction of data upon contract termination.
Source: OT.B.15: The contract should establish notification and time frame requirements and
provide for the timely return of the institution's data and resources in a machine-readable format
upon termination. Any costs associated with conversion assistance should also be clearly stated.
Incident Resilience Planning and Strategy/Planning: Roles and responsibilities for incident
response team members are defined.
Source: IS.III.D:pg51: Preparation determines the success of any intrusion response. Such
preparation involves defining the policies and procedures that guide the response; assigning
responsibilities to individuals….
IS.WP.8.6.e: Determine whether management has effective incident response processes,
including the following:…Policies and procedures to guide the response, assigning
responsibilities to individuals;…
Incident Resilience Planning and Strategy/Planning: The response team includes individuals with a
wide range of backgrounds and expertise, from many different areas within the institution. (e.g.,
management, legal, public relations, as well as information technology).
Source: IS.III.D:pg52: Because of the wide range of technical and nontechnical issues posed by an
intrusion, typical SIRT membership includes individuals with a wide range of backgrounds and
expertise from different areas within the institution. Those areas include management, legal, and
public relations, as well as IT staff.
IS.WP.8.6.c: Determine whether management has effective incident response processes, including
the following:…Appropriate balance of adequate people and technologies in the response.
Incident Resilience Planning and Strategy/Planning: A formal backup and recovery plan exists for
all critical business lines.
Source: BCP.B.4: The business continuity planning process should include the recovery,
resumption, and maintenance of all aspects of the business, not just recovery of the technology
components.
BCP.WP.3.1: Determine whether the work flow analysis was performed to ensure that all
departments and business processes are covered.
Incident Resilience Planning and Strategy/Testing: Scenarios are used to improve incident
detection and response.
Source: IS.II.C.21:pg43: Management should do the following:… Establish and maintain
policies that address the concepts of information security incident response and resilience, and
test information security incident scenarios.
BCP.B.J-13: Cyber threats will continue to challenge business continuity preparedness. Financial
institutions should remain aware of emerging cyber threats and scenarios and consider their
potential impact to operational resilience.
BCP.WP.II.1.1: Determine whether the testing strategy addresses various event scenarios,
including potential issues encountered during a wide-scale disruption.
Incident Resilience Planning and Strategy/Testing: Systems, applications, and data recovery is
tested at least annually.
Source: BCP.B.J-7: For critical services, annual or more frequent tests of the contingency plan are
required. As with all BCP testing, the frequency should be driven by the financial institution's risk
assessment, risk rating, and any significant changes to the operating environment.
BCP.WP.I.11.4: Determine whether the testing strategy includes guidelines for the frequency of
testing that are consistent with the criticality of business functions, recovery time objectives
(RTOs), recovery point objectives (RPOs), and recovery of the critical path, as defined in the
business impact analysis (BIA) and risk assessment, corporate policy, and regulatory guidelines.
Detection, Response & Mitigation/Detection: System performance reports contain information that
can be used as a risk indicator to detect information security incidents.
IS.II.D:pg45: Risk reporting is a process that produces information systems reports that address
threats, capabilities, vulnerabilities, and inherent risk changes. Risk reporting should describe
any information security events that the institution faces and the effectiveness of management’s
response and resilience to those events.
IS.WP.7.1: Determine whether the institution has risk monitoring and reporting processes that
address changing threat conditions in both the institution and the greater financial industry.
Determine whether these processes address information security events faced by the institution,
the effectiveness of management’s response, and the institution’s resilience to those events.
Detection, Response & Mitigation/Detection: Tools and processes are in place to detect, alert, and
trigger the incident response program.
Source: IS.III.D:pg50: The institution’s program should have defined protocols to declare and
respond to an identified incident.
IS.WP.8.6.a: Determine whether management has effective incident response processes,
including the following: Protocols defined in the incident response policy to declare and respond
to an incident once identified.
Detection, Response & Mitigation/Response and Mitigation: Appropriate steps are taken to contain
and control an incident to prevent further unauthorized access to or use of customer information.
Source: IS.III.D:pg52: While containment strategies between institutions can vary, they typically
include the following broad elements: Isolation of compromised systems or enhanced monitoring
of intruder activities. Search for additional compromised systems. Collection and preservation of
evidence. Communication with affected parties and often the primary regulator, information-
sharing organizations (e.g., FS-ISAC), or law enforcement.
IS.WP.8.6.b: Determine whether management has effective incident response processes,
including the following: Procedures to minimize damage through the containment of the incident,
restoration of systems, preservation of data and evidence, and notification, as appropriate, to
customers and others as needed.
Escalation and Reporting/Escalation and Reporting: The institution prepares an annual report of
security incidents or violations for the board or an appropriate board committee.
Source: IS.I.B:pg4: Management should provide a report to the board at least annually that
describes the overall status of the program and material matters related to the program,
including the following:…Security breaches or violations of law or regulation and management’s
responses to such incidents.
IS.WP.2.4.e:...Determine whether the report to the board describes the overall status of the
information security program and discusses material matters related to the program such as the
following:… Security breaches or violations and management’s responses.
Document Section
Audit (AUD) Work Program (WP)
Business Continuity Planning (BCP) or
Development and Acquisition (D&A) Booklet (B) for older
references
Information Security (IS)
or
Management (MGT) Chapter.section.sub-
Operations (OPS) section for Information
Security and
Outsourcing Technology Services Management Booklets
Retail Payment Systems (RPS)
Older references:
If it is a booklet, then the page number is listed. If it is from a work program, the tier, objective
reference, and statement number is listed. Each portion of the unique identifier is separated by a
period.
Therefore, if the reference is from the Audit Booklet page 15, it is referenced as
“AUD.B.15.”
If the reference is from the Business Continuity Planning Work Program Tier I, Objective 4,
statement 10, it is referenced as “BCP.WP.I.4.10.”
Therefore, if the reference is from the Information Security Booklet, Chapter I. Governance
of the Information Security Program, Section B. Responsibility and Accountability, page 4. It is
referenced as “IS.I.B:pg4:”
If the reference is from the Management Work Program, Objective 4,
Statement 3, it is referenced as “MGT.WP.4.3:”
References for the NIST Cybersecurity Framework are provided by page number and, if
applicable, by the reference code given to the statement by NIST. The Assessment declarative
statements are referenced by location in the tool. Following the mapping is the guide to the
development of the reference codes for the Assessment Tool.
A clear understanding of the organization’s business Accomplished by completing the Inherent Risk Profile
drivers and security considerations specific to use of part of the Assessment.
informational technology and industrial control systems.
(p. 4)
Describe current cybersecurity posture (p. 4) Accomplished by completing the Cybersecurity Maturity
part of the Assessment.
Describe target state for cybersecurity (p. 4) Accomplished if an institution implements the
Assessment as described in the User’s Guide.
Identify and prioritize opportunities for improvement with Accomplished if an institution implements the
the context of a continuous and repeatable process (p. Assessment as described in the User’s Guide.
4)
Assess progress toward the target state (p. 4) Accomplished if an institution implements the
Assessment as described in the User’s Guide.
Communicate among internal and external stakeholders D1.TC.Tr.B.3: Situational awareness materials are
about cybersecurity risk (p. 4) made available to employees when prompted by highly
visible cyber events or by regulatory alerts.
D1.TC.Tr.B.4: Customer awareness materials are
readily available (e.g., DHS’ Cybersecurity Awareness
Month materials).
June 2015 1
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Risk-based approach to managing cybersecurity risk (p. D1.RM.RA.B.1: A risk assessment focused on
4) safeguarding customer information identifies reasonable
and foreseeable internal and external threats, the
likelihood and potential damage of threats and the
sufficiency of policies, procedures and customer
information systems.
D1.RM.RA.B.2: The risk assessment identifies Internet-
based systems and high-risk transactions that warrant
additional authentication controls.
D1.RM.RA.B.3: The risk assessment is updated to
address new technologies, products, services, and
connections before deployment.
Express a risk tolerance (p. 5) D1.G.Ov.Int.1: The institution has a cyber risk appetite
statement approved by the board or an appropriate
board committee.
Determine how to handle risk (mitigate, transfer, avoid, Accomplished by completing the Cybersecurity Maturity
accept) (p. 5) part of the Assessment Tool.
Develop the organizational understanding to manage Accomplished by completing the Cybersecurity Maturity
cybersecurity risk to systems, assets, data and Domain 1, Assessment Factor Governance.
capabilities (p. 8)
Develop and implement the appropriate safeguards to Accomplished by completing the Cybersecurity Maturity
ensure delivery of critical infrastructure services (p. 8) Domain 3, Assessment Factor Preventative Controls.
Develop and implement the appropriate activities to Accomplished by completing the Cybersecurity Maturity
identify the occurrence of a cybersecurity event. (p. 8) Domain 3, Assessment Factor Detective Controls, and
Domain 5, Assessment Factor Detection, Response and
Mitigation.
Develop and implement the appropriate activities to take Accomplished by completing the Cybersecurity Maturity
action regarding a detected cybersecurity event. (p. 8) Domain 5, Assessment Factor Detection, Response and
Mitigation and Assessment Factor Escalation and
Reporting.
Develop and implement the appropriate activities to Accomplished by completing the Cybersecurity Maturity
maintain plans for resilience and to restore capabilities Domain 5, Assessment Factor Incident Resilience
or services that were impaired due to a cybersecurity Planning and Strategy.
event. (p. 9)
Tier 1: Partial
NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Tool
Cybersecurity risk management is not formalized and This falls below Baseline.
risks are managed in an ad hoc and sometimes reactive
manner. (p. 10)
June 2015 2
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Organization may not have processes that enable This falls below Baseline.
cybersecurity information to be shared within the
organization. (p. 10)
Organization may not have the processes in place to This falls below Baseline
participate in coordination or collaboration with other
entities. (p. 10)
Risk management practices are approved by D1.RM.RMP.B.1: An information security and business
management but may not be established as continuity risk management function(s) exists within the
organizational-wide policy. (p. 10) institution.
There is an awareness of cybersecurity risk at the D1.G.Ov.B.2: Information security risks are discussed in
organizational level but an organization-wide approach management meetings when prompted by highly visible
to managing cybersecurity risk has not been cyber events or regulatory alerts.
established. (p. 10)
D1.TC.Tr.B.1: Annual information security training is
provided.
D1.TC.Tr.E.2: Management is provided cybersecurity
training relevant to their job responsibilities.
June 2015 3
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Cybersecurity information is shared within the D1.TC.Tr.B.3: Situational awareness materials are
organization on an informal basis. (p. 10) made available to employees when prompted by highly
visible cyber events or regulatory alerts.
The organization knows its role in the larger ecosystem, D1.G.SP.A.3: The cybersecurity strategy identifies and
but has not formalized its capabilities to interact and communicates the institution’s role as a component of
share information externally. (p. 10) critical infrastructure in the financial services industry.
D1.G.SP.Inn.1: The cybersecurity strategy identifies and
communicates the institution’s role as it relates to other
critical infrastructures.
D2.TI.Th.B.1: The institution belongs or subscribes to a
threat and vulnerability information-sharing source(s)
that provides information on threats (e.g., FS-ISAC, US-
CERT).
Tier 3: Repeatable
NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Tool
The organization’s risk management practices are D1.G.SP.B.2: The institution has policies commensurate
formally approved and expressed as policy. (p. 10) with its risk and complexity that address the concepts of
information technology risk management.
Organizational cybersecurity practices are regularly D1.G.SP.E.3: A formal process is in place to update
updated based on the application of risk management policies as the institution’s inherent risk profile changes.
processes to changes in business/mission requirements
and a changing threat and technology landscape. (p. 10)
Consistent methods are in place to respond effectively D1.G.SP.E.3: A formal process is in place to update
to changes in risk. (p. 10) policies as the institution’s inherent risk profile changes.
Personnel possess the knowledge and skills to perform D1.R.St.E.2: Management with appropriate knowledge
their appointed roles and responsibilities. (p. 10) and experience leads the institution’s cybersecurity
efforts.
D1.R.St.E.3: Staff with cybersecurity responsibilities has
the requisite qualifications to perform the necessary
tasks of the position.
June 2015 4
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
The organization understands its dependencies and D4.C.Co.B.1: The critical business processes that are
partners and receives information from these partners dependent on external connectivity have been identified.
that enables collaboration and risk-based management
D2.TI.Th.B.1: The institution belongs or subscribes to a
decisions within the organization in response to events.
threat and vulnerability information-sharing source(s)
(p. 10)
that provides information on threats (e.g., FS-ISAC, US-
CERT).
D2.TI.Th.Int.1: A formal threat intelligence program is
implemented and includes subscription to threat feeds
from external providers and internal sources.
D4.RM.Co.E.2: Responsibility for notification of direct
and indirect security incidents and vulnerabilities is
documented in contracts or SLAs.
Tier 4: Adaptive
NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Tool
Adapt cybersecurity practices based on lessons learned D5.DR.Re.E.8: Analysis of events is used to improve the
and predictive indicators derived from previous and institution's security measures and policies.
current cybersecurity activities. (p. 11)
D5.IR.Pl.Int.4: Lessons learned from real-life cyber
incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
D1.TC.Tr.Int.1: Management incorporates lessons
learned from social engineering and phishing exercises
to improve the employee awareness programs.
Responds to evolving and sophisticated threats in a D5.IR.Pl.B.1: The institution has documented how it will
timely manner. (p. 11) react and respond to cyber incidents.
D5.IR.Pl.A.2: Multiple systems, programs, or processes
are implemented into a comprehensive cyber resilience
program to sustain, minimize and recover operations
from an array of potentially disruptive and destructive
cyber incidents.
June 2015 5
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Manages cybersecurity risk through an organization- D5.IR.Pl.B.1: The institution has documented how it will
wide approach using risk-informed policies, processes, react and respond to cyber incidents
and procedures to address potential cybersecurity
D1.TC.Cu.E.1: The institution has formal standards of
events. (p. 11)
conduct that hold all employees accountable for
complying with all cybersecurity policies and
procedures.
D1.RM.RMP.Int.2: The risk management program
specifically addresses cyber risks beyond the
boundaries of the technological impacts (e.g., financial,
strategic, regulatory, compliance).
D1.G.Ov.A.5: Management and the board or an
appropriate board committee hold business units
accountable for effectively managing all cyber risks
associated with their activities.
Encourage cybersecurity risk management as part of D1.TC.Cu.Int.2: The risk culture requires formal
culture. (p. 11) consideration of cyber risks in all business decisions.
D1.TC.Cu.A.1: Management ensures continuous
improvement of cyber risk cultural awareness.
Evolve process from an awareness of previous D1.G.Ov.A.2: Management has a formal process to
activities, information shared by other sources, and continuously improve cybersecurity oversight.
continuous awareness of activities on systems and
networks. (p. 11)
Actively share information with partners to ensure that D2.IS.Is.Int.3: Information is shared proactively with the
accurate, current information is being distributed and industry, law enforcement, regulators, and information-
consumed to improve cybersecurity before a sharing forums.
cybersecurity event occurs. (p. 11)
Framework Profile
NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Tool
Establish a roadmap for reducing cybersecurity risk. (p. Accomplished if an institution implements the
11) Assessment as described in the User’s Guide.
Identify and remediate gaps in current and target Accomplished if an institution implements the
profiles. (p. 11) Assessment as described in the User’s Guide.
Executive leadership communicates the mission Discussed in the User’s Guide and the Overview for
priorities, available resources, and overall risk tolerance Chief Executive Officers and Boards of Directors.
to the business/process level. (p. 12)
June 2015 6
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Business/Process managers collaborate with the Discussed in the User’s Guide and the Overview for
implementation/operations level to communicate Chief Executive Officers and Boards of Directors.
business needs and create a risk profile using the input
from the executive leadership. (p. 12)
Business/process managers perform an impact Discussed in the User’s Guide and the Overview for
assessment from the implementation progress provided Chief Executive Officers and Boards of Directors.
by the implementation/operations group. (p. 12)
Business/process managers perform an impact Discussed in the User’s Guide and the Overview for
assessment from the implementation progress provided Chief Executive Officers and Boards of Directors.
by the implementation/operations group. (p. 12)
Business/process managers report the outcomes of that Discussed in the User’s Guide and the Overview for
impact assessment to the executive level to inform the Chief Executive Officers and Boards of Directors.
organization’s overall risk management process. (p. 12)
Business/process managers notify the Discussed in the User’s Guide and the Overview for
implementation/operations level to raise awareness of Chief Executive Officers and Boards of Directors.
business impact. (p. 12)
Operations group communicates the risk Profile Discussed in the User’s Guide and the Overview for
implementation progress to the business/process level. Chief Executive Officers and Boards of Directors.
(p. 12)
Create or improve a cybersecurity program. (p. 13) Discussed in the User’s guide.
Organization identifies related systems and assets, Accomplished by completing the Inherent Risk Profile
regulatory requirements, and overall risk approach. (p. part of the Tool.
14)
Organization identifies threats to, and vulnerabilities of, Accomplished if an institution completes the Inherent
identified systems and assets (p. 14) Risk Profile part of the Assessment.
Conduct a risk assessment. (p. 14) Accomplished if an institution completes the Inherent
Risk Profile part of the Assessment.
Compare the current and target profile to determine Accomplished if an institution implements the
gaps. (p. 14) Assessment as described in the User’s Guide.
Create a prioritized action plan to address gaps. (p. 14) Accomplished if an institution implements the
Assessment as described in the User’s Guide.
June 2015 7
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Repeat as needed to continuously assess and improve Accomplished if an institution implements the
cybersecurity. (p. 14) Assessment as described in the User’s Guide.
Communicate cybersecurity requirements with D4.RM.Co.B.1: Formal contracts that address relevant
interdependent stakeholders responsible for the delivery security and privacy requirements are in place for all
of essential critical infrastructure services. (p. 15) third parties that process, store, or transmit confidential
data or provide critical services.
D4.RM.Co.E.2: Responsibility for notification of direct
and indirect security incidents and vulnerabilities is
documented in contracts or SLAs.
Identify and address individual privacy and civil liberties D4.RM.Co.B.1: Formal contracts that address relevant
implications that may result from cybersecurity security and privacy requirements are in place for all
operations (p. 15) third parties that process, store, or transmit confidential
data or provide critical services.
Governance of cybersecurity risk.
D1.G.Ov.E.2: Management is responsible for ensuring
Identifying and authorizing access. compliance with legal and regulatory requirements
Awareness and training measures. related to cybersecurity.
Anomalous activity detection reviewed for privacy D2.IS.Int.2: Information-sharing agreements are used
concerns. as needed or required to facilitate sharing threat
information with other financial sector institutions or third
Review of the sharing of personal information within and parties.
outside of the organization.
June 2015 8
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
ID.AM-1: Physical devices and systems within the D1.G.IT.B.1: An inventory of organizational assets (e.g.,
organization are inventoried. (p. 20) hardware, software, data, and systems hosted externally)
is maintained.
ID.AM-2: Software platforms and applications within the D1.G.IT.B.1: An inventory of organizational assets (e.g.,
organization are inventoried. (p. 20) hardware, software, data, and systems hosted externally)
is maintained.
ID.AM-3: The organizational communication and data D4.C.Co.B.4: Data flow diagrams are in place and
flow is mapped. (p. 20) document information flow to external parties.
D4.C.Co.Int.1: A validated asset inventory is used to
create comprehensive diagrams depicting data
repositories, data flow, infrastructure, and connectivity.
ID.AM-4: External information systems are mapped and D4.RM.Dd.B.2: A list of third-party service providers is
catalogued. (p. 20) maintained.
D4.C.Co.B.3: A network diagram is in place and identifies
all external connections.
ID.AM-5: Resources are prioritized based on the D1.G.IT.B.2: Institution assets (e.g., hardware, systems,
classification / criticality / business value of hardware, data, and applications) are prioritized for protection based
devices, data, and software. (p. 20) on the data classification and business value.
ID.AM-6: Workforce roles and responsibilities for D1.R.St.B.1: Information security roles and
business functions, including cybersecurity, are responsibilities have been identified.
established. (p. 20)
D1.TC.Cu.B.1: Management holds employees
accountable for complying with the information security
program.
ID.BE-1: The organization’s role in the supply chain is D1.G.SP.A.3: The cybersecurity strategy identifies and
identified and communicated. (p. 21) communicates the institution’s role as a component of
critical infrastructure in the financial services industry.
ID.BE-2: The organization’s place in critical infrastructure D1.G.SP.Inn.1: The cybersecurity strategy identifies and
and their industry ecosystem is identified and communicates its role as it relates to other critical
communicated. (p. 21) infrastructures.
ID.BE-3: Priorities for organizational mission, objectives, D1.G.SP.E.2: The institution has a formal cybersecurity
and activities are established. (p. 21) program that is based on technology and security industry
standards or benchmarks.
D1.G.Ov.Int.5: The board or an appropriate board
committee ensures management’s annual cybersecurity
self-assessment evaluates the institution’s ability to meet
its cyber risk management standards.
D1.G.SP.Int.3: The cybersecurity strategy is incorporated
into, or conceptually fits within, the institution’s enterprise-
wide risk management strategy.
June 2015 9
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
ID.BE-4: Dependencies and critical functions for delivery D4.C.Co.B.1: The critical business processes that are
of critical services are established. (p. 21) dependent on external connectivity have been identified.
D1.G.IT.B.2: Organizational assets (e.g., hardware,
systems, data, and applications) are prioritized for
protection based on the data classification and business
value.
ID.BE-5: Resilience requirements to support delivery of D5.IR.Pl.B.5: A formal backup and recovery plan exists
critical services are established. (p. 21) for all critical business lines.
D5.IR.Pl.E.3: Alternative processes have been
established to continue critical activity within a reasonable
time period.
ID.GV-1: Organizational information security policy is D1.G.SP.B.4: The institution has board-approved
established. (p. 21) policies commensurate with its risk and complexity that
address information security.
ID.GV-2: Information security roles & responsibility are D1.G.SP.B.7: All elements of the information security
coordinated and aligned with internal roles and external program are coordinated enterprise-wide.
partners. (p. 21)
D4.RM.Co.B.2: Contracts acknowledge that the third
party is responsible for the security of the institution’s
confidential data that it possesses, stores, processes, or
transmits.
D4.RM.Co.B.5: Contracts establish responsibilities for
responding to security incidents.
ID.GV-3: Legal and regulatory requirements regarding D1.G.Ov.E.2: Management is responsible for ensuring
cybersecurity, including privacy and civil liberties compliance with legal and regulatory requirements related
obligations, are understood and managed. (p. 21) to cybersecurity.
ID.GV-4: Governance and risk management processes D1.G.Ov.B.1: Designated members of management are
address cybersecurity risks. (p. 22) held accountable by the board or an appropriate board
committee for implementing and managing the information
security and business continuity programs.
D1.G.Ov.B.3: Management provides a written report on
the overall status of the information security and business
continuity programs to the board or an appropriate
committee of the board at least annually.
D1.G.Ov.E.1: At least annually, the board or an
appropriate board committee reviews and approves the
institution’s cybersecurity program.
D1.G.SP.E.1: The institution augmented its information
security strategy to incorporate cybersecurity and
resilience.
D1.G.Ov.Int.1: The institution has a cyber risk appetite
statement approved by the board or an appropriate board
committee.
June 2015 10
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
ID.RA-1: Asset vulnerabilities are identified and D2.TI.Ti.B.2: Threat information is used to monitor threats
documented. (p. 22) and vulnerabilities.
D3.DC.Th.B.1: Independent testing (including penetration
testing and vulnerability scanning) is conducted according
to the risk assessment for the external-facing systems and
the internal network.
D1.RM.RA.E.2: The focus of the risk assessment has
expanded beyond customer information to address all
information assets.
D3.DC.Th.E.5: Vulnerability scanning is conducted and
analyzed before deployment/redeployment of new/existing
devices.
D3.DC.Th.A.1: Weekly vulnerability scanning is rotated
amongst environments to scan all environments
throughout the year.
ID.RA-2: Threat and vulnerability information is received D2.TI.Ti.B.1: The institution belongs or subscribes to a
from information-sharing forums and sources. (p. 22) threat and vulnerability information-sharing source(s) that
provides information on threats (e.g., FS-ISAC, US-
CERT).
ID.RA-3: Threats to organizational assets are identified D3.DC.An.B.1: The institution is able to detect anomalous
and documented. (p. 22) activities through monitoring across the environment.
D2.MA.Ma.E.1: A process is implemented to monitor
threat information to discover emerging threats.
D2.MA.Ma.E.4: Monitoring systems operate continuously
with adequate support for efficient incident handling.
D2.MA.Ma.Int.2: A profile is created for each threat that
identifies the likely intent, capability, and target of the
threat.
ID.RA-4: Potential impacts are analyzed. (p. 22) D5.RE.Re.B.1: Appropriate steps are taken to contain and
control an incident to prevent further unauthorized access
to or use of customer information.
D5.ER.Er.Ev.1: Criteria have been established for
escalating cyber incidents or vulnerabilities to the board
and senior management based on the potential impact
and criticality of the risk.
June 2015 11
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
ID.RA-6: Risk responses are identified and prioritized. D5.IR.Pl.B.1: The institution has documented how it will
(p. 22) react and respond to cyber incidents.
D5.DR.Re.E.1: The incident response plan is designed to
prioritize incidents, enabling a rapid response for
significant cybersecurity incidents or vulnerabilities.
D5.IR.Pl.E.1: The remediation plan and process outlines
the mitigating actions, resources, and time parameters.
ID.RM-1: Risk management processes are managed D1.G.Ov.B.1: Designated members of management are
and agreed to by organizational stakeholders. (p. 23) held accountable by the board or an appropriate board
committee for implementing and managing the information
security and business continuity programs.
ID.RM-2: Organizational risk tolerance is determined and D1.G.Ov.Int.3: The institution has a cyber risk appetite
clearly expressed. (p. 23) statement approved by the board or an appropriate board
committee.
ID.RM-3: The organization’s determination of risk D1.G.SP.A.4: The risk appetite is informed by the
tolerance is informed by their role in critical infrastructure institution’s role in critical infrastructure.
and sector specific risk analysis. (p. 23)
PR.AC-1: Identities and credentials are managed for D3.PC.Im.B.7: Access to make changes to systems
authorized devices and users. (p. 23) configurations (including virtual machines and
hypervisors) is controlled and monitored.
D3.PC.Am.B.6: Identification and authentication are
required and managed for access to systems,
applications, and hardware.
PR.AC-2: Physical access to assets is managed and D3.PC.Am.B.11: Physical security controls are used to
protected. (p. 23) prevent unauthorized access to information systems and
telecommunication systems.
D3.PC.Am.B.17: Administrative, physical, or technical
controls are in place to prevent users without
administrative responsibilities from installing unauthorized
software.
PR.AC-3: Remote access is managed. (p. 23) D3.PC.Am.B.15: Remote access to critical systems by
employees, contractors, and third parties uses encrypted
connections and multifactor authentication.
D3.PC.De.E.7: The institution wipes data remotely on
mobile devices when a device is missing or stolen. (*N/A if
mobile devices are not used.)
D3.PC.Im.Int.2: Security controls are used for remote
access to all administrative consoles, including restricted
virtual systems.
June 2015 12
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
PR.AC-4: Access permissions are managed, D3.PC.Am.B.1: Employee access is granted to systems
incorporating the principles of least privilege and and confidential data based on job responsibilities and the
separation of duties. (p. 24) principles of least privilege.
D3.PC.Am.B.2: Employee access to systems and
confidential data provides for separation of duties.
D3.PC.Am.B.5: Changes to physical and logical user
access, including those that result from voluntary and
involuntary terminations, are submitted to and approved
by appropriate personnel.
PR.AC-5: Network integrity is protected, incorporating D3.DC.Im.B.1: Network perimeter defense tools (e.g.,
network segregation where appropriate. (p. 24) border router and firewall) are used.
D3.DC.Im.Int.1: The enterprise network is segmented in
multiple, separate trust/security zones with defense-in-
depth strategies (e.g., logical network segmentation, hard
backups, air-gapping) to mitigate attacks.
PR.AT-1: All users are informed and trained. (p. 24) D1.TC.Tr.B.2: Annual information security training
includes incident response, current cyber threats (e.g.,
phishing, spear phishing, social engineering, and mobile
security), and emerging issues.
PR.AT-2: Privileged users understand roles & D1.TC.Tr.E.3: Employees with privileged account
responsibilities. (p. 24) permissions receive additional cybersecurity training
commensurate with their levels of responsibility.
PR.AT-3: Third-party stakeholders (suppliers, D1.TC.Tr.B.4: Customer awareness materials are readily
customers, partners) understand roles & responsibilities. available (e.g., DHS’ Cybersecurity Awareness Month
(p. 24) materials).
D1.TC.Tr.Int.2: Cybersecurity awareness information is
provided to retail customers and commercial clients at
least annually.
PR.AT-4: Senior executives understand roles and D1.TC.Tr.E.2: Management is provided cybersecurity
responsibilities. (p. 24) training relevant to their job responsibilities.
PR.AT-5: Physical and information security personnel D1.TC.Tr.E.3: Employees with privileged account
understand roles & responsibilities. (p. 25) permissions receive additional cybersecurity training
commensurate with their levels of responsibility.
D1.R.St.E.3: Staff with cybersecurity responsibilities has
the requisite qualifications to perform the necessary tasks
of the position.
June 2015 13
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
PR.DS-1: Data-at-rest is protected. (p. 25) D1.G.IT.B.13: Confidential data is identified on the
institution's network.
D3.PC.Am.B.14: Mobile devices (e.g., laptops, tablets,
and removable media) are encrypted if used to store
confidential data. (*N/A if mobile devices are not used).
D4.RM.Co.B.1: Formal contracts that address relevant
security and privacy requirements are in place for all third
parties that process, store, or transmit confidential data or
provide critical services.
D3.PC.Am.A.1: Encryption of select data at rest is
determined by the institution’s data classification and risk
assessment.
PR.DS-2: Data-in-transit is protected. (p. 25) D3.PC.Am.B.13: Confidential data is encrypted when
transmitted across public or untrusted networks (e.g.,
Internet).
D3.PC.Am.E.5: Controls are in place to prevent
unauthorized access to cryptographic keys.
D3.PC.Am.Int.7: Confidential data is encrypted in transit
across private connections (e.g., frame relay and T1) and
within the institution’s trusted zones.
PR.DS-3: Assets are formally managed throughout D1.G.IT.E.3: The institution proactively manages system
removal, transfers, and disposition. (p. 25) end-of-life (e.g., replacement) to limit security risks.
D1.G.IT.E.2: The institution has a documented asset life-
cycle process that considers whether assets to be
acquired have appropriate security safeguards.
PR.DS-4: Adequate capacity to ensure availability is D5.IR.Pl.B.5: A formal backup and recovery plan exists
maintained. (p. 25) for all critical business lines.
D5.IR.Pl.B.6: The institution plans to use business
continuity, disaster recovery, and data backup programs
to recover operations following an incident.
D5.IR.Pl.E.3: Alternative processes have been
established to continue critical activity within a reasonable
time period.
D3.PC.Im.E.4: A risk-based solution is in place at the
institution or Internet-hosting provider to mitigate
disruptive cyber attacks (e.g., DDoS attacks).
June 2015 14
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
PR.DS-5: Protections against data leaks are D3.PC.Am.B.15: Remote access to critical systems by
implemented. (p. 26) employees, contractors, and third parties uses encrypted
connections and multifactor authentication.
D3.PC.Am.Int.1: The institution has implemented tools to
prevent unauthorized access to or exfiltration of
confidential data.
D3.PC.De.Int.1: Data loss prevention controls or devices
are implemented for inbound and outbound
communications (e.g., e-mail, FTP, Telnet, prevention of
large file transfers).
D3.DC.Ev.Int.1: Controls or tools (e.g., data loss
prevention) are in place to detect potential unauthorized or
unintentional transmissions of confidential data.
PR.DS-6: Integrity checking mechanisms are used to D3.PC.Se.Int.3: Software code executables and scripts
verify software, firmware, and information integrity. (p. are digitally signed to confirm the software author and
26) guarantee that the code has not been altered or
corrupted.
D3.PC.De.Int.2: Mobile device management includes
integrity scanning (e.g., jailbreak/rooted detection). (*N/A if
mobile devices are not used.)
PR.DS-7: The development and testing environment(s) D3.PC.Am.B.10: Production and non-production
are separate from the production environment. (p. 26) environments are segregated to prevent unauthorized
access or changes to information assets. (*N/A if no
production environment exists at the institution or the
institution’s third party.)
PR.IP-2: A System Development Life Cycle to manage D3.PC.Se.B.1: Developers working for the institution
systems is implemented. (p. 26) follow secure program coding practices, as part of a
system development life cycle (SDLC), that meet industry
standards.
D3.PC.Se.E.1: Security testing occurs at all post-design
phases of the SDLC for all applications, including mobile
applications. (*N/A if there is no software development.)
PR.IP-3: Configuration change control processes are in D1.G.IT.B.4: A change management process is in place
place. (p. 27) to request and approve changes to systems
configurations, hardware, software, applications, and
security tools.
PR.IP-4: Backups of information are conducted, D5.IR.Pl.B.5: A formal backup and recovery plan exists
maintained, and tested periodically. (p. 27) for all critical business lines.
D5.IR.Te.E.3: Information backups are tested periodically
to verify they are accessible and readable.
PR.IP-5: Policy and regulations regarding the physical D3.PC.Am.B.11: Physical security controls are used to
operating environment for organizational assets are met. prevent unauthorized access to information systems and
(p. 27) telecommunication systems.
June 2015 15
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
PR.IP-6: Data is destroyed according to policy. (p. 27) D1.G.IT.B.19: Data is disposed of or destroyed according
to documented requirements and within expected time
frames.
PR.IP-7: Protection processes are continuously D1.RM.RMP.E.2: Management reviews and uses the
improved. (p. 27) results of audits to improve existing policies, procedures,
and controls.
D1.G.Ov.A.2: Management has a formal process to
continuously improve cybersecurity oversight.
PR.IP-8: Effectiveness of protection technologies is D2.IS.Is.B.1: Information security threats are gathered
shared with appropriate parties. (p. 28) and shared with applicable internal employees.
D2.IS.Is.E.2: A representative from the institution
participates in law enforcement or information-sharing
organization meetings.
PR.IP-9: Response plans (Incident Response and D5.IR.Pl.B.1: The institution has documented how it will
Business Continuity) and recovery plans (Incident react and respond to cyber incidents.
Recovery and Disaster Recovery) are in place and
managed. (p. 28)
PR.IP-10: Response and recovery plans are tested. (p. D5.IR.Te.B.1: Scenarios are used to improve incident
28) detection and response.
D5.IR.Te.B.3: Systems, applications, and data recovery is
tested at least annually.
PR.IP-11: Cybersecurity is included in human resources D1.R.St.E.4: Employment candidates, contractors, and
practices (e.g., deprovisioning, personnel screening). (p. third parties are subject to background verification
28) proportional to the confidentiality of the data accessed,
business requirements, and acceptable risk.
PR.IP-12: A vulnerability management plan is developed D3.CC.Re.Ev.2: Formal processes are in place to resolve
and implemented. (p. 28) weaknesses identified during penetration testing.
PR.MA-1: Maintenance and repair of organizational D3.CC.Re.Int.5: The maintenance and repair of
assets is performed and logged in a timely manner, with organizational assets are performed by authorized
approved and controlled tools (p. 28) individuals with approved and controlled tools.
D3.CC.Re.Int.6: The maintenance and repair of
organizational assets are logged in a timely manner.
PR.MA-2: Remote maintenance of organizational assets D3.PC.Im.B.7: Access to make changes to systems
is approved, logged, and performed in a manner that configurations (including virtual machines and
prevents unauthorized access (p. 28) hypervisors) is controlled and monitored.
PR.PT-1: Audit/log records are determined, documented, D1.G.SP.B.3: The institution has policies commensurate
implemented, and reviewed in accordance with policy. (p. with its risk and complexity that address the concepts of
29) threat information sharing.
D2.MA.Ma.B.1: Audit log records and other security event
logs are reviewed and retained in a secure manner.
D2.MA.Ma.B.2: Computer event logs are used for
investigations once an event has occurred.
June 2015 16
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
PR.PT-2: Removable media is protected and its use D1.G.SP.B.4: The institution has board-approved policies
restricted according to a specified policy. (p. 29) commensurate with its risk and complexity that address
information security.
D3.PC.De.B.1: Controls are in place to restrict the use of
removable media to authorized personnel.
D3.PC.Im.E.3: Technical controls prevent unauthorized
devices, including rogue wireless access devices and
removable media from connecting to the internal
network(s).
PR.PT-3: Access to systems and assets is controlled, D3.PC.Am.B.7: Access controls include password
incorporating the principle of least functionality. (p. 29) complexity and limits to password attempts and reuse.
D3.PC.Am.B.4: User access reviews are performed
periodically for all systems and applications based on the
risk to the application or system.
D3.PC.Am.B.3: Elevated privileges (e.g., administrator
privileges) are limited and tightly controlled (e.g., assigned
to individuals, not shared, and require stronger password
controls).
D4.RM.Om.Int.1: Third-party employee access to the
institution's confidential data is tracked actively based on
the principles of least privilege.
PR.PT-4: Communications networks are secured. (p. 29) D3.PC.Im.B.1: Network perimeter defense tools (e.g.,
border router and firewall) are used.
D3.PC.Am.B.11: Physical security controls are used to
prevent unauthorized access to information systems, and
telecommunication systems.
D3.PC.Im.Int.1: The enterprise network is segmented in
multiple, separate trust/security zones with defense-in-
depth strategies (e.g., logical network segmentation, hard
backups, air-gapping) to mitigate attacks.
DE.AE-1: A baseline of network operations and expected D3.DC.Ev.B.1: A normal network activity baseline is
data flows for users and systems is established and established.
managed. (p. 30)
D4.C.Co.B.4: Data flow diagrams are in place and
document information flow to external parties.
DE.AE-2: Detected events are analyzed to understand D5.IR.Pl.Int.4: Lessons learned from real-life cyber risk
attack targets and methods. (p. 30) incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
DE.AE-3: Event data are aggregated and correlated D3.DC.Ev.E.1: A process is in place to correlate event
from multiple sources and sensors. (p. 30) information from multiple sources (e.g., network,
application, or firewall).
June 2015 17
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
DE.AE-4: Impact of event is determined. (p. 30) D5.IR.Te.E.1: Recovery scenarios include plans to
recover from data destruction, and impacts to data
integrity, data loss, and system and data availability.
D5.ER.Es.E.1: Criteria have been established for
escalating cyber incidents or vulnerabilities to the board
and senior management based on the potential impact
and criticality of the risk.
D1.RM.RMP.A.4: A process is in place to analyze the
financial impact cyber incidents have on the institution’s
capital.
DE.AE-5: Incident alert thresholds are established. (p. D5.DR.De.B.1: Alert parameters are set for detecting
30) information security incidents that prompt mitigating
actions.
D3.DC.An.E.4: Thresholds have been established to
determine activity within logs that would warrant
management response.
D3.DC.An.Int.3: Tools actively monitor security logs for
anomalous behavior and alert within established
parameters.
DE.CM-1: The network is monitored to detect potential D3.DC.An.B.2: Customer transactions generating
cybersecurity events. (p. 30) anomalous activity alerts are monitored and reviewed.
D3.DC.An.B.3: Logs of physical and/or logical access are
reviewed following events.
DE.CM-3: Personnel activity is monitored to detect D3.DC.An.A.3: A system is in place to monitor and
potential cybersecurity events. (p. 31) analyze employee behavior (network use patterns, work
hours, and known devices) to alert on anomalous
activities.
DE.CM-4: Malicious code is detected. (p. 31) D3.DC.Th.B.2: Antivirus and anti-malware tools are used
to detect attacks.
DE.CM-5: Unauthorized mobile code is detected. (p. 31) D3.PC.De.E.5: Antivirus and anti-malware tools are
deployed on end-point devices (e.g., workstations,
laptops, and mobile devices).
DE.CM-6: External service provider activity is monitored D4.RM.Om.Int.1: Third-party employee access to the
to detect potential cybersecurity events. (p. 31) institution's confidential data is tracked actively based on
the principles of least privilege.
DE.CM-7: Monitoring for unauthorized personnel, D3.DC.Ev.B.3: Processes are in place to monitor for the
connections, devices and software is performed. (p. 31) presence of unauthorized users, devices, connections,
and software.
June 2015 18
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
DE.CM-8: Vulnerability scans are performed. (p. 31) D3.DC.Th.E.5: Vulnerability scanning is conducted and
analyzed before deployment/redeployment of new/existing
devices.
DE.DP-1: Roles and responsibilities for detection are D3.DC.Ev.B.4: Responsibilities for monitoring and
well defined to ensure accountability. (p. 31) reporting suspicious systems activity have been assigned.
DE.DP-2: Detection activities comply with all applicable D1.G.Ov.E.2: Management is responsible for ensuring
requirements. (p. 32) compliance with legal and regulatory requirements related
to cybersecurity.
DE.DP-3: Detection processes are tested. (p. 32) D3.DC.Ev.Int.2: Event detection processes are proven
reliable.
DE.DP-4: Event detection information is communicated D3.DC.Ev.B.2: Mechanisms (e.g., antivirus alerts, log
to appropriate parties. (p. 32) event alerts) are in place to alert management to potential
attacks.
D5.ER.Is.B.1: A process exists to contact personnel who
are responsible for analyzing and responding to an
incident.
D5.ER.Is.E.1: Criteria have been established for
escalating cyber incidents or vulnerabilities to the board
and senior management based on the potential impact
and criticality of the risk.
DE.DP-5: Detection processes are continuously D5.IR.Pl.Int.3: Lessons learned from real-life cyber
improved. (p. 32) incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
RS.PL-1: Response plan is executed during or after an D5.IR.Pl.B.1: The institution has documented how it will
event. (p. 33) react and respond to cyber incidents.
RS.CO-1: Personnel know their roles and order of D5.IR.Pl.B.3: Roles and responsibilities for incident
operations when a response is needed. (p. 33) response team members are defined.
RS.CO-2: Events are reported consistent with D5.IR.Pl.B.2: Communication channels exist to provide
established criteria. (p. 33) employees a means for reporting information security
events in a timely manner.
D5.DR.Re.B.4: Incidents are classified, logged and
tracked.
D5.DR.Re.E.6: Records are generated to support incident
investigation and mitigation.
D5.ER.Es.B.4: Incidents are detected in real time through
automated processes that include instant alerts to
appropriate personnel who can respond.
RS.CO-3: Information is shared consistent with D5.ER.Es.B.2: Procedures exist to notify customers,
established criteria. (p. 33) regulators, and law enforcement as required or necessary
when the institution becomes aware of an incident
involving the unauthorized access to or use of sensitive
customer information.
June 2015 19
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
RS.CO-4: Coordination with stakeholders occurs D5.ER.Is.B.1: A process exists to contact personnel who
consistent with response plans. (p. 33) are responsible for analyzing and responding to an
incident.
D5.IR.Pl.Int.1: A strategy is in place to coordinate and
communicate with internal and external stakeholders
during or following a cyber attack.
RS.CO-5: Voluntary information sharing occurs with D2.IS.Is.B.3: Information about threats is shared with law
external stakeholders to achieve broader cybersecurity enforcement and regulators when required or prompted.
situational awareness. (p. 33)
D2.IS.Is.E.2: A representative from the institution
participates in law enforcement or information-sharing
organization meetings.
RS.AN-1: Notifications from the detection system are D5.DR.De.B.3: Tools and processes are in place to
investigated. (p. 33) detect, alert, and trigger the incident response program.
D5.DR.De.Int.3: Incidents are detected in real time
through automated processes that include instant alerts to
appropriate personnel who can respond.
RS.AN-2: The impact of the incident is understood. (p. D1.RM.RMP.A.4: A process is in place to analyze the
34) financial impact cyber incidents have on the institution’s
capital.
D5.IR.Te.E.1: Recovery scenarios include plans to
recover from data destruction, impacts to data integrity,
data loss, and system and data availability.
D5.ER.Es.E.1: Criteria have been established for
escalating cyber incidents or vulnerabilities to the board
and senior management based on the potential impact
and criticality of the risk.
RS.AN-3: Forensics are performed. (p. 34) D3.CC.Re.Int.3: Security investigations, forensic analysis,
and remediation are performed by qualified staff or third
parties.
D3.CC.Re.Int.4: Generally accepted and appropriate
forensic procedures, including chain of custody, are used
to gather and present evidence to support potential legal
action.
RS.AN-4: Incidents are categorized consistent with D5.ER.Es.B.4: Incidents are classified, logged and
response plans. (p. 34) tracked.
D5.DR.Re.E.1: The incident response plan is designed to
prioritize incidents, enabling a rapid response for
significant cybersecurity incidents or vulnerabilities.
June 2015 20
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
RS.MI-1: Incidents are contained. (p. 34) D5.DR.Re.B.1: Appropriate steps are taken to contain
and control an incident to prevent further unauthorized
access to or use of customer information.
D5.DR.Re.E.4: Procedures include containment strategies
and notifying potentially impacted third parties.
D5.DR.Re.E.2: A process is in place to help contain
incidents and restore operations with minimal service
disruption.
D5.DR.Re.E.3: Containment and mitigation strategies are
developed for multiple incident types (e.g., DDoS,
malware).
RS.MI-2: Incidents are mitigated. (p. 34) D5.DR.De.B.1: Alert parameters are set for detecting
information security incidents that prompt mitigating
actions.
D5.DR.Re.E.3: Containment and mitigation strategies are
developed for multiple incident types (e.g., DDoS,
malware).
D3.PC.Im.E.4: A risk-based solution is in place at the
institution or Internet-hosting provider to mitigate
disruptive cyber attacks (e.g., DDoS attacks).
RS.MI-3: Newly identified vulnerabilities are documented D1.RM.RA.E.1: Risk assessments are used to identify the
as accepted risks. (p. 34) cybersecurity risks stemming from new products, services,
or relationships.
RS.IM-1: Response plans incorporate lessons learned. D5.IR.Pl.Int.4: Lessons learned from real-life cyber
(p. 34) incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
RS.IM-2: Response strategies are updated. (p. 34) D5.IR.Pl.Int.4: Lessons learned from real-life cyber
incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
D5.IR.Te.Int.5: The results of cyber event exercises are
used to improve the incident response plan and
automated triggers.
RC.RP-1: Recovery plan is executed during or after an D5.IR.Pl.B.6: The institution plans to use business
event. (p. 34) continuity, disaster recovery, and data backup programs
to recover operations following an incident.
RC.IM-1: Recovery plans incorporate lessons learned. D5.IR.Pl.Int.4: Lessons learned from real-life cyber
(p. 35) incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
June 2015 21
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
RC.IM-2: Recovery strategies are updated. (p. 35) D5.IR.Pl.Int.4: Lessons learned from real-life cyber
incidents and attacks on the institution and other
organizations are used to improve the institution’s risk
mitigation capabilities and response plan.
D5.IR.Te.Int.5: The results of cyber event exercises are
used to improve the incident response plan and
automated triggers.
RC.CO-1: Public Relations are managed. (p. 35) D5.ER.Es.Int.3: An external communication plan is used
for notifying media regarding incidents when applicable.
RC.CO-2: Reputation after an event is repaired. (p. 35) D5.IR.Pl.Int.1: A strategy is in place to coordinate and
communicate with internal and external stakeholders
during or following a cyber attack.
RC.CO-3: Recovery activities are communicated to D5.ER.Is.B.1: A process exists to contact personnel who
internal stakeholders and executive and management are responsible for analyzing and responding to an
teams. (p. 35) incident.
D5.IR.Pl.Int.1: A strategy is in place to coordinate and
communicate with internal and external stakeholders
during or following a cyber attack.
June 2015 22
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Audit (Au)
Culture (Cu)
June 2015 23
FFIEC Cybersecurity Assessment Tool Mapping Cybersecurity Assessment Tool
to NIST Cybersecurity Framework
Remediation (Re)
June 2015 24
Appendix C: Glossary
Air-gapped environment: Security measure that isolates a secure network from unsecure
networks physically, electrically, and electromagnetically. Source: FFIEC Joint Statement -
Destructive Malware
Anomalous activity: The process of comparing definitions of what activity is considered normal
against observed events to identify significant deviations. Source: NIST: SP 800-94
Authentication: The process of verifying the identity of an individual user, machine, software
component, or any other entity. Source: FFIEC Information Security Booklet
Baseline configuration: A set of specifications for a system, or configuration item (CI) within a
system, that has been formally reviewed and agreed on at a given point in time, and that can
be changed only through change-control procedures. The baseline configuration is used as a
basis for future builds, releases, or changes. Source: NIST: SP 800-128
Black holing: A method typically used by ISPs to stop a DDoS attack on one of its customers.
This approach to block DDoS attacks makes the site in question completely inaccessible to
all traffic, both malicious attack traffic and legitimate user traffic. Source: NCCIC/US-CERT
DDoS Quick Guide
Border router: A device located at the organization’s boundary to an external network. Source:
NIST: SP 800-41
Buffer overflow: A condition at an interface under which more input can be placed into a buffer
or data-holding area than the capacity allocated, overwriting other information. Attackers
exploit such a condition to crash a system or to insert specially crafted code that allows them
to gain control of a system. Source: NISTIR 7298 Revision 2
Business continuity: The ability to maintain operations and services—both technology and
business—in the event of a disruption to normal operations and services. Ensures that any
impact or disruption of services is within a documented and acceptable recovery time period
and that system or operations are resumed at a documented and acceptable point in the
processing cycle. Source: FFIEC IT Examination Handbook Glossary
June 2015 1
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Change management: The broad processes for managing organizational change. Change
management encompasses planning, oversight or governance, project management, testing,
and implementation. Source: FFIEC Operations Booklet
Cloud computing: Generally a migration from owned resources to shared resources in which
client users receive information technology services on demand from third-party service
providers via the Internet “cloud.” In cloud environments, a client or customer relocates its
resources—such as data, applications, and services—to computing facilities outside the
corporate firewall, which the end user then accesses via the Internet. Source: FFIEC
Statement on Outsourced Cloud Computing
Critical system [infrastructure]: The systems and assets, whether physical or virtual, that are
so vital that the incapacity or destruction of such may have a debilitating impact. Source:
NICCS Glossary
Cyber event: A cybersecurity change or occurrence that may have an impact on organizational
operations (including mission, capabilities, or reputation). Source: NIST Cybersecurity
Framework
Cyber incident: Actions taken through the use of computer networks that result in an actual or
potentially adverse effect on an information system or the information residing therein.
Source: NIST: CNSSI-4009
Cyber threat: An internal or external circumstance, event, action, occurrence, or person with the
potential to exploit technology-based vulnerabilities and to adversely impact (create adverse
consequences for) organizational operations, organizational assets (including information and
information systems), individuals, other organizations, or society. Source: NICCS Glossary
June 2015 2
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Data classification program: A program that categorizes data to convey required safeguards for
information confidentiality, integrity, and availability; establishes controls required based on
value and level of sensitivity. Source: Derived from SANS Institute InfoSec Reading Room
Database: A collection of data that is stored on any type of computer storage medium and may
be used for more than one purpose. Source: FFIEC IT Examination Handbook Glossary
Data loss prevention (DLP): A comprehensive approach (covering people, processes, and
systems) of implementing policies and controls designed specifically to discover, monitor,
and protect confidential data wherever it is stored, used, or in transit over the network and at
the perimeter. Source: NSA/CSS Securing Data and Handling Spillage Events
Data mining: The process or techniques used to analyze large sets of existing information to
discover previously unrevealed patterns or correlations. Source: NICCS Glossary
Deep packet inspection: The capability to analyze network traffic to compare vendor-developed
profiles of benign protocol activity against observed events to identify deviations. Source:
NIST Guide to Intrusion Detection and Prevention Systems
Digital certificate: The electronic equivalent of an ID card that authenticates the originator of a
digital signature. Source: FFIEC IT Examination Handbook Glossary
Disaster recovery plan: A plan that describes the process to recover from major processing
interruptions. Source: FFIEC IT Examination Handbook Glossary
Distributed denial of service (DDoS): A type of attack that makes a computer resource or
resources unavailable to its intended users. Although the means to carry out, motives for, and
targets of a DDoS attack may vary, it generally consists of the concerted efforts of a group
that intends to affect an institution’s reputation by preventing an Internet site, service, or
application from functioning efficiently. Source: FFIEC IT Examination Handbook Glossary
Domain Name System Security Extensions (DNSSEC): A technology that was developed to,
among other things, protect against such attacks by digitally ‘signing’ data so you can be
assured it is valid. Source: ICANN
Encryption: A data security technique used to protect information from unauthorized inspection
or alteration. Information is encoded so that data appear as meaningless strings of letters and
symbols during delivery or transmission. Upon receipt, the information is decoded using an
encryption key. Source: FFIEC IT Examination Handbook Glossary
End-of-life: All software products have life cycles. End-of-life refers to the date when a
software development company no longer provides automatic fixes, updates, or online
technical assistance for the product. Source: US-CERT alert TA-14-310A
June 2015 3
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
End-point security: Security controls that validate the security compliance of the client system
that is attempting to use the Secure Sockets Layer (SSL) virtual private networks (VPN).
Endpoint security controls also include security protection mechanisms, such as Web
browser cache cleaners, that remove sensitive information from client systems. Source:
NIST: SP 800-113
Exploit: A technique or code that uses a vulnerability to provide system access to the attacker.
An exploit is an intentional attack to impact an operating system or application program.
Source: FFIEC IT Examination Handbook Glossary
FTP (file transfer protocol): A standard high-level protocol for transferring files from one
computer to another, usually implemented as an application level program. Source: National
Telecommunications and Information Administration
Firewall: Hardware or software link in a network that relays only data packets clearly intended
and authorized to reach the other side. Source: FFIEC IT Examination Handbook Glossary
Frame relay: A high-performance WAN protocol that operates at the physical and data link
layers of the open systems interconnect (OSI) reference model. Frame relay is an example of
a packet-switched technology. Packet-switched networks enable end stations to dynamically
share the network medium and the available bandwidth. Frame relay uses existing T1 and T3
lines and provides connection speeds from 56 Kbps to T1. Source: FFIEC IT Examination
Handbook Glossary
Gap analysis: A comparison that identifies the difference between actual and desired outcomes.
Source: FFIEC IT Examination Handbook Glossary
Governance: In computer security, the setting of clear expectations for the conduct (behaviors
and actions) of the entity being governed and directing, controlling, and strongly influencing
the entity to achieve these expectations. Governance includes specifying a framework for
June 2015 4
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Hypervisor: A piece of software that provides abstraction of all physical resources (such as
central processing units, memory, network, and storage) and thus enables multiple computing
stacks (consisting of an operating system, middleware and application programs) called
virtual machines to be run on a single physical host. Source: NIST SP 800-125a Draft
Incident response plan: A plan that defines the action steps, involved resources, and
communication strategy upon identifying a threat or potential threat event, such as a breach
in security protocol, power or telecommunications outage, severe weather, or workplace
violence. Source: FFIEC IT Examination Handbook Glossary
Information security: The result of any system of policies or procedures for identifying,
controlling, and protecting information from unauthorized disclosure. Also, the processes by
which an organization protects and secures its systems, media, and facilities that process and
maintain information vital to its operations. Source: FFIEC IT Examination Handbook
Glossary
Information systems: Electronic and paper-based systems. Electronic systems and physical
components used to access, store, transmit, protect, and eventually dispose of information.
Information systems can include networks (computer systems, connections to business
partners and the Internet, and the interconnections between internal and external systems).
Other examples are backup tapes, portable computers, personal digital assistants, media such
as compact disks, micro drives, and diskettes, and media used in software development and
testing. Source: FFIEC Information Security Booklet
Internet service provider (ISP): A company that provides its customers with access to the
Internet (e.g., AT&T, Verizon, CenturyLink). Source: FFIEC IT Examination Handbook
Glossary
Intrusion detection system (IDS): Software and hardware that detect and log inappropriate,
incorrect, or anomalous activity. IDS are typically characterized based on the source of the
data they monitor: host or network. A host-based IDS uses system log files and other
electronic audit data to identify suspicious activity. A network-based IDS uses sensors to
monitor packets on the network to which it is attached. Source: FFIEC IT Examination
Handbook Glossary
June 2015 5
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Intrusion prevention systems (IPS): A system that can detect an intrusive activity and can also
attempt to stop the activity, ideally before it reaches its target. Source: NISTIR 7298 Revision
2
Life-cycle process: The multistep process that starts with the initiation, analysis, design, and
implementation, and continues through the maintenance and disposal of the system. Source:
NIST System Development Life Cycle
Malware: Designed to secretly access a computer system without the owner’s informed consent.
The expression is a general term (short for malicious software) used to mean a variety of
forms of hostile, intrusive, or annoying software or program code. Malware includes
computer viruses, worms, Trojan horses, spyware, dishonest adware, ransomware,
crimeware, most rootkits, and other malicious and unwanted software or programs. Source:
FFIEC IT Examination Handbook Glossary
Man-in-the-middle attack (MITM): Places the attacker’s computer in the communication line
between the server and the client. The attacker’s machine can monitor and change
communications. Source: FFIEC IT Examination Handbook Glossary
Multifactor authentication: The process of using two or more factors to achieve authentication.
Factors include something you know (e.g., password or personal identification number);
something you have (e.g., cryptographic identification device or token); and something you
are (e.g., biometric). Source: NISTIR 7298 Revision 2
National Institute of Standards and Technology (NIST): An agency of the U.S. Department
of Commerce that works to develop and apply technology, measurements, and standards;
developed a voluntary cybersecurity framework based on existing standards, guidelines, and
practices for reducing cyber risks to critical infrastructures. Source: NIST
Network: Two or more computer systems grouped together to share information, software, and
hardware. Source: FFIEC IT Examination Handbook Glossary
Network activity baseline: A base for determining typical utilization patterns so that significant
deviations can be detected. Source: NIST: SP 800-61
Network diagram: A description of any kind of locality in terms of its physical layout. In the
context of communication networks, a topology describes pictorially the configuration or
June 2015 6
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
arrangement of a network, including its nodes and connecting communication lines. Source:
FFIEC IT Examination Handbook Glossary
Operating system: A system that supports and manages software applications. Operating
systems allocate system resources, provide access and security controls, maintain file
systems, and manage communications between end users and hardware devices. Source:
FFIEC IT Examination Handbook Glossary
Outsourcing: The practice of contracting with another entity to perform services that might
otherwise be conducted in-house. Contracted relationship with a third party to provide
services, systems, or support. Source: FFIEC IT Examination Handbook Glossary
Patch: Software code that replaces or updates other code frequently to correct security flaws.
Source: FFIEC IT Examination Handbook Glossary
Penetration test: The process of using approved, qualified personnel to conduct real-world
attacks against a system to identify and correct security weaknesses before they are
discovered and exploited by others. Source: FFIEC IT Examination Handbook Glossary
Principles of least privilege: The security objective of granting users only the access needed to
perform official duties. Source: NISTIR 7298 Revision 2
Privileged access: Individuals with the ability to override system or application controls.
Source: FFIEC Information Security Booklet
Red team: A group of people authorized and organized to emulate a potential adversary’s attack
or exploitation capabilities against an enterprise’s security posture. The red team’s objective
is to improve enterprise information assurance by demonstrating the impacts of successful
attacks and by demonstrating what works for the defenders in an operational environment.
Source: NIST: CNSSI-4009
Remote access: The ability to obtain access to a computer or network from a remote location.
Source: FFIEC IT Examination Handbook Glossary
Remote deposit captures (RDC): A service that enables users at remote locations to scan digital
images of checks and transmit the captured data to a financial institution or a merchant that is
a customer of a financial institution. Source: FFIEC IT Examination Handbook Glossary
June 2015 7
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Removable media: Portable electronic storage media, such as magnetic, optical, and solid-state
devices, which can be inserted into and removed from a computing device and which is used
to store text, video, audio, and image information. Such devices have no independent
processing capabilities. Examples include hard disks, floppy disks, zip drives, compact disks
(CD), thumb drives, pen drives, and similar storage devices. Source: NIST: CNSSI-4009
Resilience: The ability of an organization to recover from a significant disruption and resume
critical operations. Source: FFIEC IT Examination Handbook Glossary
Risk management: The total process required to identify, control, and minimize the impact of
uncertain events. The objective of a risk management program is to reduce risk and obtain
and maintain appropriate management approval. Source: FFIEC IT Examination Handbook
Glossary
Rlogin: Remote login. A UNIX utility that allows a user to login to a remote host on a network,
as if it were directly connected, and make use of various services. Remote login is an
information exchange between network-connected devices where the information cannot be
reliably protected end-to-end by a single organization’s security controls. Source: NIST
Electronic Authentication Guidance
Rogue wireless access: An unauthorized wireless node on a network. Source: NISTIR 7298
Revision 2
Router: A hardware device that connects two or more networks and routes incoming data
packets to the appropriate network. Source: FFIEC IT Examination Handbook Glossary
Security log: A record that contains login and logout activity and other security-related events
and that is used to track security-related information on a computer system. Source: NIST:
SP 800-92
Security posture: The security status of an enterprise’s networks, information, and systems
based on information assurance resources (e.g., people, hardware, software, and policies) and
capabilities in place to manage the defense of the enterprise and to react as the situation
changes. Source: NISTIR 7298 Revision 2
June 2015 8
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Server: A computer or other device that manages a network service. An example is a print
server, which is a device that manages network printing. Source: FFIEC IT Examination
Handbook Glossary
Social engineering: A general term for trying to trick people into revealing confidential
information or performing certain actions. Source: NIST SP 800-114
Spear phishing: An attack targeting a specific user or group of users, and attempts to deceive
the user into performing an action that launches an attack, such as opening a document or
clicking a link. Spear phishers rely on knowing some personal piece of information about
their target, such as an event, interest, travel plans, or current issues. Sometimes this
information is gathered by hacking into the targeted network. Source: Guidelines for Secure
Use of Social Media by Federal Departments and Agencies
SQL injection attack: An exploit of target software that constructs structure query language
(SQL) statements based on user input. An attacker crafts input strings so that when the target
software constructs SQL statements based on the input, the resulting SQL statement performs
actions other than those the application intended. SQL injection enables an attacker to talk
directly to the database, thus bypassing the application completely. Successful injection can
cause information disclosure as well as ability to add or modify data in the database. Source:
MITRE Common Attack Pattern Enumeration and Classification
System development lifecycle process: The scope of activities associated with a system,
encompassing the system’s initiation, development and acquisition, implementation,
operation and maintenance, and ultimately its disposal that instigates another system
initiation. Source: NIST System Development Life Cycle
T1: A special type of telephone line for digital communication and transmission. T1 lines
provide for digital transmission with signaling speed of 1.544 Mbps (1,544,000 bits per
June 2015 9
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
second). This is the standard for digital transmissions in North America. Usually delivered on
fiber optic lines. Source: FFIEC IT Examination Handbook Glossary
Telnet: An interactive, text-based communications session between a client and a host. It is used
mainly for remote login and simple control services to systems with limited resources or to
systems with limited needs for security. Source: Guide to Industrial Control Systems (ICS)
Security
Third-party relationship: Any business arrangement between a financial institution and another
entity, by contract or otherwise. Source: OCC Bulletin 2013-29
Third-party service provider: Any type of company, including affiliated entities, non-affiliated
entities, and alliances of companies providing products and services to the financial
institution. Other terms used to describe service providers include vendors, subcontractors,
external service providers, application service providers, and outsourcers. Source: FFIEC IT
Examination Handbook Glossary
Threat intelligence: The acquisition and analysis of information to identify, track, and predict
cyber capabilities, intentions, and activities that offer courses of action to enhance decision-
making. Source: SEI Emerging Technology Center: Cyber Intelligence Tradecraft Project
Token: A small device with an embedded computer chip that can be used to store and transmit
electronic information. Source: FFIEC IT Examination Handbook Glossary
Trusted zone: A channel in which the end points are known and data integrity is protected in
transit. Depending on the communications protocol used, data privacy may be protected in
transit. Examples include secure socket layer, internet protocol security and a secure physical
connection. Source: CNSSI Glossary
US-CERT: The U.S. Computer Emergency Readiness Team, part of the U.S. Department of
Homeland Security’s National Cybersecurity and Communications Integration Center. US-
CERT is a partnership between the Department of Homeland Security and the public and
private sectors, established to protect the nation’s Internet infrastructure. US-CERT
coordinates defense against and responses to cyber attacks across the nation. Source: US-
CERT
VPN (virtual private network): A computer network that uses public telecommunication
infrastructure, such as the Internet, to provide remote offices or individual users with secure
access to their organization’s network. Source: FFIEC IT Examination Handbook Glossary
Vulnerability: A hardware, firmware, or software flaw that leaves an information system open
to potential exploitation; a weakness in automated system security procedures, administrative
controls, physical layout, internal controls, etc., that could be exploited to gain unauthorized
access to information or to disrupt critical processing. Source: FFIEC IT Examination
Handbook Glossary
June 2015 10
FFIEC Cybersecurity Assessment Tool Appendix C: Glossary
Zero-day attack: An attack on a piece of software that has a vulnerability for which there is no
known patch. Source: DHS Continuous Diagnostics and Mitigation
June 2015 11