OSFI technology and cyber incident report – Detailed instructions
Information
Table of contents
General instructions
As per our Technology and Cyber Security Incident Advisory, institutions must report a technology or cyber security incident within 24 hours, or sooner if possible. A list of reporting criteria is available within the Advisory.
Mandatory fields must be completed at a minimum for initial reporting of active/ongoing incidents. Other fields can be completed in subsequent updates when the information becomes available. Mandatory fields are identified with an asterisk (*). For resolved incidents please provide as much information as available.
Information provided can be best estimates, including financial or customer impact, and may not be definitive at the time of reporting. Information provided can also be updated in the post-incident report.
Until the incident is resolved, we expect institutions to provide situation updates, including any short term and long-term remediation action plans and timelines.
Depending on the severity, impact, and velocity of the incident, we may recommend methods and frequency of subsequent updates.
Institutions should submit their incident report to the Technology Risk Division at TRD-DRT@osfi-bsif.gc.ca and their lead supervisor.
Instructions for incident form sections
Incident information
Institution nameFootnote * | Record the legal name of the Federally Regulated Financial Institution. |
---|---|
Incident name or identifier |
Record the identifier used internally by federally regulated financial institutions to identify the incident. For example:
|
Incident report typeFootnote * |
The initial submission is the first report submitted by the institution. Once the initial report has been submitted, all subsequent reports should be considered as updates. For updated reports, the same incident name or identifier can be used. |
Incident statusFootnote * |
An active incident is an incident that is currently ongoing and requires containment or recovery efforts that are not yet effectively implemented. Active incident reports should have as much detail as possible in the incident description field to minimize information requests. Active incidents require regular updates until they have been resolved and closed. A resolved incident is one that has been fully addressed, with all necessary actions taken to mitigate its impact and restore normal operations. |
Date, time and time zone the incident occurred | The actual date and time of the incident occurrence, either at the institution or at a third-party. Once the date has been selected, please enter the time and time zone in the designated fields. Please note that the time should be entered in a 24-hour format (YYYY-MM-DD HH:mm). |
Date, time and time zone the incident was detected | The actual date and time of the incident detection, either by institution or by a third-party. Once the date has been selected, please enter the time and time zone in the designated fields. Please note that the time should be entered in a 24-hour format (YYYY-MM-DD HH:mm). |
Site location and lines of business affected
Where did the incident occur?Footnote * |
Select from the drop-down list the most appropriate entity where the incident occurred. If the incident took place at:
If “other” is selected, please provide details in the next field. |
---|---|
Third-party, subcontractor, or other details | If the incident originated at a third party or subcontractor, indicate their full legal name. |
Business line and service identification |
A business line refers to a specific area of operation. For example:
Indicate all business lines or services impacted, separated with a comma, and avoid acronyms. |
Geographic site or locale affected |
If the incident has an impact beyond a single location, provide a list of affected locations or descriptions of the geographical extent of the incident. Also include the names of the countries or jurisdictions that have been affected. Enter the affected sites or locale affected (for example, city, province or state, country, world-wide. |
Technology assets affected |
A technology asset is a tangible (for example, hardware, infrastructure) or intangible (for example, software, data, information) item that facilitates the delivery of technology services. Please indicate the names of the technology assets affected and indicate whether it is a critical asset. If the function is not apparent from the name, provide a brief description. Expand all acronyms. |
Incident details
Incident categoryFootnote * |
A technology incident is any disruption or failure of technology assets that affects business operations or services. A cyber incident is any incident involving unauthorized access or malicious activity targeting information systems, data, or networks, often with the intent to steal, disrupt, or damage technology assets. |
---|---|
Incident result |
The incident result is the outcome or adverse impact of the incident on the organization’s technology assets and operations. This reflects how the incident affected the confidentiality, availability, or integrity of services, systems, or data. A “compromise” is an incident result when data, systems, or users are compromised because of data exposure, account takeover, or privileged access to systems gained by unauthorized entities for example. A “degradation” is an incident result when a service or application operates at diminished capacity, such as slow responses to queries or delays in processing. An "outage" is an incident result when a service or function is unavailable or offline. |
Incident type |
An incident type describes how a technology asset has been determined and observed to be deteriorated. An incident type can also indicate a threat vector or attack technique, such as phishing and malware, used by a threat actor which leads to an incident result (degradation, outage, or compromise). Select the best match from the list below.
|
Incident severity or priorityFootnote * |
The severity or priority levels represent the incident classification levels based on the potential impact of the incident. Institutions should use their internal assessment processes to ascertain the potential impact, with Severity 1, Priority 1, or Critical being the highest level of impact. If internal categories exceed the 4 tiers, select an option as close to the level as possible. |
Incident descriptionFootnote * |
The incident description should provide any additional information that is not captured in the previous fields and provide more context surrounding the incident, its detection, impacts, affected internal and external parties, planned remedial actions, and lessons learned. Information can include incident details, such as:
|
Breach of recovery point objective (RPO) or recovery time objective (RTO) |
RTO refers to the maximum allowable time to restore systems, services, or data following an incident. RPO refers to the maximum amount of data loss that can be tolerated, measured in time. It defines the point in time to which data must be restored after an incident. If “under assessment” is selected during an initial report, please confirm RTO/RPO breach in a subsequent update. |
Activation of business continuity plans (BCPs) or disaster recovery plans (DRPs) |
BCPs are the procedures to maintain essential operations during and after an incident, disruption, or crisis. DRPs are a set of policies and procedures for restoring systems and data after a disaster or major incident. If “under assessment” is selected during an initial report, please confirm BCP/DRP activation in a subsequent update. |
Impact scope – Service delivery |
If the incident has impacted the ability to deliver a service, select the level of impact identified by the institution from the drop-down list. The rating is from none through low, moderate, high to critical. If service delivery impact is under assessment, please provide the assessed rating in a subsequent update. |
Impact scope – (Loss of) Sensitive information |
If the incident includes exposure or loss of sensitive data, select the level of impact identified by the institution from the drop-down list. The rating is from none through low, moderate, high to critical. If sensitive data impact is under assessment, please provide assessed rating in a subsequent update. |
Impact scope – Media or public sentiment |
Describe any reporting, statements or sentiment arising from mainstream or social media channels. Enter the current level of media or public discourse resulting from the incident. |
Estimated financial impact or financial risk (in CAD) |
This represents the estimated total cost for the incident response effort, plus remediation (including remediation for clients). If financial impact is under assessment, please provide the estimated cost in a subsequent update. |
Estimated number of impacted users, clients, or transactions | Provide the estimated number of employees, clients, or transactions impacted by the incident. |
Estimated recovery timeframe | If the incident is ongoing or still active, please provide best estimate of date and time when the incident will be resolved or is expected to be resolved. |
Incident duration | Please provide the total duration for resolved incidents. This should be measured from the incident occurrence to the return to normal operations. Indicate the time in units of days, hours, and minutes. |
Incident recurrence |
If the incident is related to a previous incident, please provide the reference(s) to the previously reported incident(s). If incident recurrence relation is under assessment, please provide assessment result in a subsequent update. |
Incident root cause |
The root cause of an incident is the underlying factor that must be addressed to prevent a reoccurrence of the chain of events that led to the incident. If the root cause is known at the time of reporting, select the appropriate one. Provide additional details including (but not limited to): cause of the issue, failed controls resulting in the incident, and planned improvements to prevent incident reoccurrence in the root cause description field. If the root cause is under assessment, provide the root cause information in subsequent updates or in the post-incident report submission. The incident root cause descriptions are as follows:
|
Cyber threat actor details
Threat-actor tactics, techniques, and procedures (TTP) (cyber incidents) |
TTPs describe the behavior of a threat actor. A tactic describes a threat actor behavior at the highest-level. Techniques give a more detailed description of it, and procedures are the lowest level detailed actionable steps. Where applicable, include known details about the threat actor’s behavior, including vulnerabilities exploited and threat-actor attribution. |
---|---|
Indicators of compromise (IoC)– Hash, URL, email, IP, etc. |
Indicators of compromise are essentially evidence or trace of malicious activities or behaviour left behind by a threat-actor. Where applicable, provide any known technical or non-technical indicators, including any references (for example, NVD, CVE) to exploited vulnerability. These could include unusual actions, IP addresses, URLs, mail header fields or file hashes. For example:
|
Internal and external notifications
Senior management notification |
Select from the drop-down list whether senior management (executives, board members, etc.) have been notified of the incident. If the senior management has been notified enter the actual date and time of notification. Once the date has been selected, please enter the time and time zone in the designated fields. Please note that the time should be entered in a 24-hour format (YYYY-MM-DD HH:mm). |
---|---|
Other regulatory or supervisory notification | Enter the name(s) of the notified regulatory or supervisory entity within the free-text field. |
Law enforcement or security agency notification | Enter the name(s) of the notified law enforcement or security agency within the free-text field. |
Cyber insurance notification or claim submission | Indicate whether insurance or cyber-insurance providers have been notified or a claim has been filed as a result of the incident. |