Cyber Security Self-Assessment

Type of Publication: Memorandum
Date: August 13, 2021
To: Federally Regulated Financial Institutions

The increasing frequency, severity and sophistication of cyber threats and attacks has resulted in an elevated risk profile for many organizations around the world, including federally regulated financial institutions (FRFIs) in Canada.

In October 2013, the Office of the Superintendent of Financial Institutions (OSFI) published its Cyber Security Self-Assessment to help FRFIs assess their level of cyber preparedness. Since then, this self-assessment has helped FRFIs prepare and improve their cyber security posture. However, digitalization of financial services is broadening the attack surface and introducing new entry points into FRFIs' technology environment, meaning institutions continue to be highly exposed to cyber risk. As a result, OSFI is enhancing its Cyber Security Self-Assessment to reflect the current cyber risk landscape in line with its strategic priorities.

FRFIs are encouraged to use this self-assessment or similar tools to assess their current level of cyber preparedness and to develop and maintain effective cyber security practices. As indicated in its Near-Term Plan of Prudential Policy, OSFI will establish new guidance for the sound management of technology and cyber risk. This self-assessment will supplement forthcoming guidance and will be refreshed regularly to keep abreast with the cyber risk landscape.

Further questions can be directed to Chris Suknundun, Managing Director, Technology Risk Division, at TRD@osfi-bsif.gc.ca.

Chris Suknundun
Managing Director

Rating levels explained

The cyber risk rating levels referred to in this self-assessment are intended to help the FRFI gauge the maturity of individual security controls (in the Column "Controls"). Those control statements address best practices, cyber risk and related processes, documentation, roles and responsibilities, technologies and other cyber security safeguards, all of which are important to robust cyber security operations and for the FRFI's strategic cyber security program development.

The maturity level that the FRFI assigns to each control is intended to estimate the maturity of that control, with reference to the differentiated levels.

Those ratings are then applicable in highlighting controls which are maturing effectively, as well as those which will need more attention (i.e., to address deficiencies). Maturity levels are also informative, in discussions with OSFI, and for future Cyber Security planning within the FRFI.

In this regard, OSFI has identified Cyber Security maturity levels (1-to-5). Level "0" is technically a sixth level but it only indicates a lack of any progress with respect to the assessed control.

Note: for most of the Cyber Security controls listed, there will be inter-dependencies with other controls (e.g., Risk Assessment, implemented by the Cyber Security group, will be related to Risk Management, as addressed by risk managers including senior management). So, in the following statements, the term "controls" is sometimes used, although when the FRFI completes this assessment, and estimates maturity scores, those scores are to be assigned to each individual control, one at a time rather than collectively.

OSFI Cyber Security Self Assessment

Focus Number Category Control Statement Rating FRFI Rating Rationale and Notes FRFI Provided Supporting References
Governance 1 Planning and Strategy The FRFI has published a cyber risk strategy that is aligned with the technology and business strategies. blank blank blank
2 blank The FRFI has an established cyber risk framework (e.g., a complete set of elements including policies, standards, roles and responsibilities, risk management processes, risk taxonomy, risk appetite and emerging threats and technologies) in support of the cyber risk strategy, and ongoing threat, risk and incident management. blank blank blank
3 blank The FRFI conducts regular reviews of the cyber risk strategy and cyber risk framework, to ensure compliance with legal and regulatory requirements. blank blank blank
4 blank The FRFI considers cyber risk compliance requirements, identified risks, current and emerging threats, and potential incident related impacts on operations and services, as inputs to planning and prioritizing cyber risk projects, programs and budgets. blank blank blank
5 blank The FRFI has appointed an executive responsible for the cyber risk strategy, the cyber risk framework and for cyber risk awareness and knowledge at the executive level. blank blank blank
6 Policy The FRFI has documented cyber risk policies to explain staff and contractor roles, responsibilities, rules and constraints as well as possible penalties for non-compliance. blank blank blank
7 blank The roles and responsibilities of each of the three lines of defence and other stakeholders are clearly described within the cyber risk framework. blank blank blank
8 Risk Management Key risk and performance indicators as well as thresholds have been established for the FRFI's key cyber risk and controls. The risk indicators should align with the cyber risk appetite as stated in the cyber risk framework. blank blank blank
9 blank Cyber risks to the organization and its programs or customers are regularly reviewed, prioritized, escalated, explained to the appropriate executives or senior management, and those risks are prioritized for mitigation. blank blank blank
10 blank The second line of defence regularly provides an independent review of the various cyber risk assessments and other control activities conducted by the first line of defence. blank blank blank
11 blank The FRFI ensures that background checks have been implemented for personnel/contractors and at third party providers, commensurate with the sensitivity and cyber risk needs of FRFI assets being managed. blank blank blank
12 blank The FRFI has implemented a formal process for risk acceptance that is measured, tracked and reported. blank blank blank
Identify 13 Business Environment The FRFI has allocated sufficient and skilled resources for the sustainment of cyber risk programs, systems, roles and services. blank blank blank
14 blank The FRFI has identified its critical technology assets and has implemented appropriate controls to ensure confidentiality, integrity and availability. The controls are regularly reviewed and tested. blank blank blank
15 blank The FRFI ensures that contracts for outsourcing and external services (e.g., third party providers, Cloud Service Providers) include supplier and service provider responsibilities for the security of the FRFI's information. blank blank blank
16 Asset Management The FRFI maintains a configuration management database (CMDB) or similar utility for documenting and tracking IT component configurations (i.e., hardware, software, network addresses, security systems, dependencies, etc.). blank blank blank
17 blank The FRFI's IT assets and information are classified and managed according to a classification scheme. blank blank blank
18 blank The FRFI has established procedures for the disposal or destruction of IT assets. blank blank blank
19 Risk Assessment The FRFI conducts Threat and Risk Assessments in the early stages of new initiatives/projects or prior to changes in existing systems and data, to identify and prioritize threats, risks and remediation options. blank blank blank
20 blank The FRFI should periodically assess their cyber risks, which will require consideration for and assessment of the robustness, currency and completeness of the cyber risk practices and controls. blank blank blank
21 blank The FRFI conducts regular penetration testing against the network, Cloud environment and all critical IT systems to identify security gaps and deficiencies, and to affirm strengths. blank blank blank
Defend 22 Identity Management and Access Control The FRFI implements a consistent access control model (e.g., Role Based Access Control) across all critical systems. blank blank blank
23 blank The FRFI requires that all persons, systems or services be identified, authenticated and authorized prior to granting access to FRFI systems, services or data. blank blank blank
24 blank The FRFI consistently applies the principle of "least privilege", such that the permissions and access granted to an authenticated person, system or service is sufficient to their operational need, and no higher. blank blank blank
25 blank The FRFI ensures that permissions are revoked and accounts or active connections are terminated, when no longer required. blank blank blank
26 blank The FRFI implements Multi-Factor Authentication for access to critical systems and for remote access to the FRFI network. blank blank blank
27 blank The FRFI encrypts and securely stores identity and access control credentials (e.g. passwords), separate from other data. blank blank blank
28 blank Privileged account credentials are managed, monitored and secured. blank blank blank
29 Network Security The FRFI follows a positive security model for network security, allowing only pre-defined and authorized traffic (IP addresses, protocols, ports, etc.). blank blank blank
30 blank The FRFI defines logical network zones, and applies controls to segregate and limit or block traffic between those zones, to help track, manage and secure the assets within those zones. blank blank blank
31 blank The FRFI places all internet facing systems and services in a DMZ or similar, segregated and closely monitored network zone with carefully secured and limited connection into the broader environment. blank blank blank
32 blank The FRFI engages in ongoing Threat Hunting (e.g., using manual techniques and machine learning tools) to proactively identify and isolate advanced threats which may not be detected by automated tools. blank blank blank
33 blank The FRFI implements critical network security and traffic management controls to be fault tolerant, and to fail securely, so that security will not be compromised during any fault, outage or security incident. blank blank blank
34 blank The FRFI limits remote access and connection options to authorized personnel, including third party providers, and secures all remote sessions (e.g., with session encryption, MFA, session timeouts). blank blank blank
35 Data Security The FRFI has implemented data loss prevention (DLP) controls across all technology assets for data at rest, data in use and data in transit to identify attempts at unauthorized data exfiltration, and to automatically limit or stop associated data loss. blank blank blank
36 blank The FRFI assesses all external data interfaces (e.g. APIs) to ascertain if implemented security controls are appropriate to the sensitivity of the FRFI's data. blank blank blank
37 blank The FRFI uses automated tools to examine all data (including source code and configuration data) prior to its introduction into FRFI's systems, to identify and quarantine unauthorized executable code (e.g., malware), and potentially harmful data. blank blank blank
38 blank The FRFI encrypts all data to be physically transported internally or externally (e.g., on portable/removable storage media), and restricts such data transport to authorized individuals only. blank blank blank
39 blank FRFI personnel "work from home" solutions are implemented with strong end-point controls (e.g., in laptops or other mobile devices) to maintain robust security. blank blank blank
40 blank The FRFI conducts regular, automated back-ups of its data. blank blank blank
41 Vulnerability Management The FRFI has published and implemented a Vulnerability and Patch Management Program, providing rules and guidance on roles, responsibilities, the FRFI's vulnerability management life cycle, vulnerability prioritization (e.g., based on risk), remediation timeframes, exception/exemption approvals, monitoring and reporting, and tools to be applied. blank blank blank
42 blank The FRFI has identified reputable sources of vulnerability information, and subscribes to recognized and authoritative vulnerability reporting services. blank blank blank
43 blank The FRFI conducts regular vulnerability scanning to identify new vulnerabilities. blank blank blank
44 blank The FRFI prioritizes identified vulnerabilities for resolution, based on the risk and potential impact represented. blank blank blank
45 blank The FRFI has an exception/exemption management process that documents and requires appropriate management approvals, for delays or exceptions to vulnerability remediation (e.g., through application of vendor supplied patches). blank blank blank
46 blank The FRFI verifies and tests vulnerability patches, prior to general deployment within the operational environment. blank blank blank
47 blank The FRFI identifies contingency options for reversing vulnerability resolution measures (e.g., through roll-back of patches), prior to general deployment. blank blank blank
48 blank The FRFI has established timelines for applying patches based on risk. blank blank blank
49 Change and Configuration Management The FRFI has created, documented and implemented standardized, secure configurations for all hardware and software (e.g., Operating Systems, VMs, desktop image). blank blank blank
50 blank The FRFI hardens all critical systems and networks. blank blank blank
51 blank The FRFI enforces security policies through the use of automated tools to identify and block use of unauthorized software and hardware across all of its systems. blank blank blank
52 blank The FRFI has documented and implemented a Change Management process, to formally identify, assess, approve and document configuration changes. blank blank blank
Detect 53 Monitoring and Logging The FRFI monitors all networks, sub-networks, and interfaces to identify information security events such as unauthorized connection attempts, unusual or suspicious traffic patterns or use of unauthorized ports and protocols. blank blank blank
54 blank The FRFI has established requirements for log collection and retention across all IT assets. blank blank blank
55 blank The FRFI uses automated tools (e.g., a SIEM or Log Analytics Tool) to collect, aggregate and analyze event data in real time or near to real time (e.g., anomalous activity), and alerts personnel according to established use cases and rules. blank blank blank
56 blank The FRFI's network monitoring and management processes are integrated with Incident Response processes, for rapid and formal escalations, communications and resolution of priority events. blank blank blank
57 blank FRFI and service provider logs and related records pertaining to security events are encrypted, time stamped and archived for later reference as needed. Event logs are maintained in a secure location. blank blank blank
58 Benchmarking, Reviews and Assessments The FRFI conducts ongoing and periodic assessments (e.g., of cyber risk processes), with reference to external security frameworks, best practices, and emerging vulnerabilities to identify control gaps or deficiencies across the FRFI environment, and to identify opportunities and recommendations for improvement. blank blank blank
59 blank The FRFI conducts ongoing reviews to determine policy compliance. blank blank blank
60 blank The FRFI conducts regular, automated reviews of IT infrastructure (e.g., endpoints) to verify that security controls are configured and functioning as expected. blank blank blank
61 blank The FRFI communicates security assessment and audit results to appropriate internal management, and to the executive(s) responsible for the cyber risk framework. blank blank blank
62 Secure Software Development The FRFI treats security and the adoption of security best practices as a priority within the software development life cycle. blank blank blank
63 blank The FRFI deploys all software, including off the shelf products, in a segregated test environment, and executes relevant testing and security scans, prior to general deployment. blank blank blank
64 blank The FRFI verifies the code from external sources is from a reputable and recognized source (e.g., by review of digital signature, or hash function). blank blank blank
Respond 65 Incident Management The FRFI's Incident Management standard is designed to respond rapidly to cyber risk incidents. blank blank blank
66 blank The FRFI has established a "whole of organization " response including but not limited to: cyber risk team, IT team, business owner, legal, privacy, and communications (public affairs), and others as required and has developed playbooks and runbooks as needed. blank blank blank
67 blank The FRFI regularly exercises the Incident Management standard. blank blank blank
68 blank The FRFI has an established communication plan that includes, but is not limited to, customers/clients, business partners, provincial or federal regulatory or security agencies, law enforcement, internal staff, and others as appropriate. blank blank blank
69 blank The FRFI conducts post-incident analysis to identify root cause, vulnerabilities, remedies and to document lessons learned for future reference by staff. blank blank blank
Recover 70 Testing and Planning The FRFI regularly tests data back-ups to verify their integrity, and to confirm that restoration of data is feasible in case of need. blank blank blank
71 blank The FRFI develops and tests playbooks to ensure timely restoration of data, systems or services impacted by cyber risk incidents. blank blank blank
72 blank The FRFI has a Disaster Recovery Plan and/or Business Continuity Plan to execute in the event of a material cyber risk incident. blank blank blank
Learn 73 Continuous Improvement The FRFI regularly reviews its IT environment and mitigates risks from end of life/support hardware and software. blank blank blank
74 blank The FRFI conducts threat modeling to improve cyber resilience. blank blank blank
75 blank The FRFI conducts regular simulation exercises (e.g. ransomware, DDOS) to validate response plans, and familiarize stakeholders with their roles and responsibilities. blank blank blank
76 blank The FRFI subscribes to reputable information sources for understanding of emerging threats, trends, vulnerabilities, and cyber risk best practices. blank blank blank
77 blank The FRFI keeps abreast of new and emerging technologies and their impact on cyber risk. blank blank blank
78 Security Education The FRFI has a cyber risk education and awareness plan for employees, customers and other stakeholders. blank blank blank
79 blank The FRFI provides for necessary and appropriate training for cyber risk personnel, to maintain current knowledge and skills, in support of their roles and responsibilities. blank blank blank
80 blank The FRFI provides all staff with ongoing security awareness education to make them aware of their role and responsibilities with respect to cyber risk, to help them identify threats and to explain cyber risk best practices. blank blank blank
81 blank FRFI executives and senior management are regularly briefed on cyber risk trends, identified risks, incidents, planned cyber risk initiatives and associated, potential impacts on the organization. blank blank blank
Third Party Providers 82 Governance and Management The FRFI has identified and assessed cyber risk arising from its third party providers. The risk assessment is regularly refreshed and drives the frequency and intensity of risk management activities (e.g., due diligence, contract obligations, monitoring, reporting and assurance activities). blank blank blank
83 blank The FRFI ensures that cyber risk controls implemented by third party providers are appropriate to the sensitivity of FRFI data, and are as robust and comprehensive as those which the FRFI implements on premise. blank blank blank
84 blank FRFI has developed exit strategies for critical third party providers that outline possible cyber related scenarios, triggers and alternative solutions developed and assessed for viability. blank blank blank
85 blank The FRFI periodically obtains independent assurance of third party controls using various methods such as audit certifications, internal audit reviews, pooled audits etc. blank blank blank
86 blank The FRFI ensures that the third party provider has established incident response playbooks, including procedures as to when and how the FRFI will be informed of any impact on its systems, services or data. blank blank blank
87 blank The FRFI verifies that third party providers completely delete all FRFI data including backups, when no longer required. blank blank blank
88 Cloud Service Providers The FRFI has a documented Cloud exit strategy that defines cyber risk processes, roles and responsibilities to be implemented if the FRFI discontinues CSP services (e.g., to migrate to a different CSP). blank blank blank
89 blank The FRFI ensures that all cyber risk roles and responsibilities (e.g., for implementation and management of controls), are clearly documented and agreed by all parties when implementing Cloud services (IaaS, PaaS, and SaaS). blank blank blank
90 blank Centralized logging and monitoring processes are implemented across all Cloud assets, with the capability to conduct consolidated analysis and reporting on the security posture across all platforms. blank blank blank