Working Group 6: Best Practice Implementation



Similar documents
Undersea Cables and International Telecommunications Resiliency Important to the Evolution of Global Financial Services

Working Group 5: Remediation of Server Based DDoS Attacks. Status Update

Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update

Working Group 5: Remediation of Server-Based DDoS Attacks. Status Update. March 20, 2014

How To Protect The Internet From Natural Disasters

LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council

OCC 98-3 OCC BULLETIN

Appendix 3 Disaster Recovery Plan

SHARED ASSESSMENTS PROGRAM STANDARD INFORMATION GATHERING (SIG) QUESTIONNAIRE 2014 MAPPING TO OCC GUIDANCE ( ) ON THIRD PARTY RELATIONSHIPS

Banking and Finance Sector-Specific Plan An Annex to the National Infrastructure Protection Plan

NRSC PANDEMIC CHECKLIST

RISK MANAGEMENT REPORT (for the Financial Year Ended 31 March 2012)

GUIDELINES FOR BUSINESS CONTINUITY IN WHOLESALE MARKETS AND SUPPORT SYSTEMS MARKET SUPERVISION OFFICE. October 2004

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

FFIEC Cybersecurity Assessment Tool

Business Continuity Plan (BCP)

Roles within ITIL V3. Contents

CISM Certified Information Security Manager

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

CENTRAL BANK OF NIGERIA

Ames Consolidated Information Technology Services (A-CITS) Statement of Work

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

M&T Bank Corporation Resolution Plan Public Section

FISCAL PLAN RESPONSE TO THE AUDITOR GENERAL

National Communications System. December 6, 2007

PROPOSED INTERPRETIVE NOTICE

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Outage Reporting in the US

TO: Chief Executive Officers of National Banks, Federal Branches and Data-Processing Centers, Department and Division Heads, and Examining Personnel

INFORMATION TECHNOLOGY SECURITY STANDARDS

Technology Risk Management

The PNC Financial Services Group, Inc. Business Continuity Program

Continuity of Business

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Data Center Assistance Group, Inc. DCAG Contact: Tom Bronack Phone: (718) Fax: (718)

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL

Technical Standards for Information Security Measures for the Central Government Computer Systems

ISO Controls and Objectives

Information Security Program CHARTER

CSRIC IV - Working Group 4: Cybersecurity Best Practices Status Update

How To Resolve A Bank In The United States

Consultative report. Committee on Payment and Settlement Systems. Board of the International Organization of Securities Commissions

TESTIMONY OF VALERIE ABEND SENIOR CRITICAL INFRASTRUCTURE OFFICER OFFICE OF THE COMPTROLLER OF THE CURRENCY. Before the

Infrastructure Interdependencies

How To Assess A Critical Service Provider

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Federal Financial Institutions Examination Council FFIEC. Business Continuity Planning BCP MARCH 2003 MARCH 2008 IT EXAMINATION

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5),

Anthony J. Albanese, Acting Superintendent of Financial Services. Financial and Banking Information Infrastructure Committee (FBIIC) Members:

Cybersecurity Awareness. Part 2

Statement of Business Continuity Management

NCUA LETTER TO CREDIT UNIONS

Security in Space: Intelsat Information Assurance

Does it state the management commitment and set out the organizational approach to managing information security?

T1M1: Management Plane Security Standard (T1.276)

Vendor Risk Management Financial Organizations

Public Service Commission CAPITAL CIRCLE OFFICE CENTER? 2540 SHUMARD OAK BOULEVARD TALLAHASSEE, FLORIDA

Unit Guide to Business Continuity/Resumption Planning

External Supplier Control Requirements

Best Practices for Telecommunications Network Reliability

Regulatory Notice 13-25

TABLE OF CONTENTS INTERAGENCY ADVISORY ON ACCOUNTING AND REPORTING FOR COMMITMENTS TO ORIGINATE AND SELL MORTGAGE LOANS

TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING

DEPARTMENT OF THE TREASURY. Office of the Comptroller of the Currency. [Docket ID OCC ] FEDERAL RESERVE SYSTEM. [Docket No.

Cash Management. Solutions That Fit

Written Statement of Richard Dewey Executive Vice President New York Independent System Operator

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

250 E Street, SW 20 th Street & Constitution Avenue, NW Washington, DC Washington, DC 20551

INSPECTOR GENERAL STATEMENT ON THE FEDERAL COMMUNICATIONS COMMISSION S MAJOR MANAGEMENT CHALLENGES FISCAL YEAR 2005

GUIDANCE FOR MANAGING THIRD-PARTY RISK

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Office of Inspector General

Transcription:

Working Group 6: Best Practice Implementation Final Report March 14, 2011 Stacy Hartman Steve Malphrus Co-Chairs Scott Tollefsen Co-Presenter

Overview of the U.S. Financial System U.S. Financial System: components, participants, and instruments Financial system: private sector controls and trade groups Audit, public disclosure, rating agencies, etc. Associations ABA, SIA, BMA FIA ICBA, ACB, etc. Components: credit, debt & equity, exchange traded derivatives, and insurance transactions Lenders/Investors individuals, firms, government transactions Financial markets securities, bonds, futures & options markets, etc. Financial instruments securities, futures, annuities, loans, derivatives, CP, FX, etc. Financial intermediaries banks, savings institutions, Broker/dealers, FCMs, insurance companies, etc. Financial utilities: payment, clearing & settlement Service providers transactions Borrowers/Issuers individuals, firms, government transactions Financial system: Applicable laws and regulations Supervision: Fed, SEC, OCC, CFTC, FDIC, OTS, OFHEO, NCUA, SROs and state authorities. Central bank and Treasury functions (Federal Reserve and the Department of the Treasury) Critical public utilities and services: Telecommunications, power, transportation, public safety, insurance companies as recovery agents Source: Steve Malphrus, Chair, Financial Sector Assessment Task Force President s Working Group on Financial Markets 2

Online Links Branch Platform and Teller Systems Technology and Telecommunications in a U.S. Commercial Bank Environmental Systems Security, and Vault Control Systems Security Monitoring Company Phone Switches and Voice Response Systems Correspondent and Clearing Systems Customers External Links to Financial Services Firms, Payment Systems & Utilities Correspondent Banks, Clearing Houses, etc. Backup Data Centers Trading Systems Financial Markets: NYSE, CME, NASDAQ, CBT, etc. Retail Customers Wholesale Customers Management Information Systems: reports for executives, risk mgt., boards of directors, etc. Home & Telephone Banking Systems Treasury, Money Market & Trade Fin. Systems, etc. Back Office Systems Currency Sorters Call Centers Computer & Communications Systems DDA, Loans, CIS General Ledger, MIS,etc. Payments Systems ATM & Credit Card Systems Regulatory Reporting Fedwire, SWIFT, CHIPS, ACH, etc. ATM, Credit & Debit Card Networks Regulatory Agencies External Service Providers External Information Providers: Dun & Bradstreet, Credit Bureaus, etc. Item Processing, Check Sorters & Image Systems Software Libraries Payroll Service Bureau Trust Services Company Example of IT systems and internal data flows supporting the lending process LAN Loan Underwriting and Review Loan Funding Records Systems Loan Documentation Loan Servicer Loan Administration Note: FBO transactions are often performed on IT Systems located in home countries Source: Steve Malphrus, Chair, Financial Sector Group, Presidents Council on Year 2000 Conversion 3

Characteristics of Best Practice Resiliency Models Contingency In Depth + Practice = Resiliency Contingency In Depth includes: People Buildings and public utilities Telecommunications (voice and data) Information systems and data bases Operations Practice includes: Operations simulations, etc. Management table top exercises, etc. 4

Working Group 6 Best Practice Implementation The diversity of our industry does not lend itself to the indiscriminate application of a monolithic set of Best Practices dictated from your regulator. Rather, NRIC Best Practices are most rapidly and most effectively applied by leaving specific implementation decisions to individual firms. When each company uses its own technical and operational judgment to determine where and when to deploy NRIC Best Practices, network reliability and security are improved, I believe, at least cost. FCC Chairman Michael Powell, NRIC VI, September 15, 2003 5

Working Group 6 Best Practice Implementation Description: This working group will develop options and recommendations for CSRIC s consideration regarding the key best practices for each communications industry segment that should be implemented by communications service providers in order to enhance the security, reliability, operability and resiliency of communications infrastructure. The working group will also develop, for CSRIC s consideration, options and recommendations for methods to measure reliably and accurately the extent to which these key best practices are being implemented. In fulfilling this task, the working group will examine best practices previously recommended by the former Network Reliability & Interoperability Council and the former Media Security & Reliability Council as well as any best practices that may be approved by the CSRIC. Duration: Completion of charter (i.e., March 18, 2011) 6

Working Group 6 Participants Name Organization Stacy Hartman (Co Chair) Steve Malphrus (Co Chair) Jackie Voss Jim Runyon Gordon Barber Doug Peck Mike Giampietro Rick Kemper Stephen Hayes John Healy Peter Fonash Qwest Federal Reserve Board of Governors Alliance for Telecommunications Industry Solutions (ATIS) Alcatel Lucent, Bell Labs AT&T California 911 Emergency Communications Office Cox CTIA Ericsson Federal Communications Commission (FCC) Liaison Federal Reserve Board of Governors Wayne Pacine Thomas Hicks Jim Corry Karen Eccli Cynthia Daily Intrado LightSquared, Satellite Industry Association (SIA) Qwest Sprint Nextel Richard Zinno Spilios Makris Uma Chandrashekhar Jay Naillon Telcordia Technologies TIA T Mobile Harold Salters Scott Tollefsen Stephen Washburn Kevin Green Marcia Brooks USA Mobility, Inc. US Department of Health and Human Services (DHHS) Verizon WGBH National Center for Accessible Media (NCAM) 7

Working Group 6 Executive Summary Reviewed 800+ Best Practices (BPs) related to: Cyber Security (205) Business Continuity and Disaster Recovery (217) E911 (51) and Physical Security (124) Network Reliability (251) Developed criteria for classifying these BPs as Critical, Highly Important or Important Identified and documented which of the BPs should be considered vital across communications industry segments Best Practice Review & Ranking Category # of Best Practices Critical 114 Highly Important 348 Important 341 8

Working Group 6 Best Practice Ranking Physical Security Committee **SAMPLE SPREADSHEET** Best Practice Number Best Practice Description Final Priority Notes 7 7 5107 Network Operators, Service Providers and Equipment Suppliers should evaluate and manage risks (e.g., alternate routing, rapid response to emergencies) associated with a concentration of infrastructure components. Critical It is critical that network operators, service providers and equipment suppliers perform risk assessments of their communications networks for all configurations and develop risk mitigation procedures/processes to reduce the duration or severity of future critical communications outages. This is of particular importance where there is a concentration of equipment, circuits, facilities, etc. and the impact of a major failure could cascade to a larger geographic region. 7 7 5196 MOPs: Network Operators and Service Providers should ensure that contractors and Equipment Supplier personnel working in critical network facilities follow the current applicable MOP (Method of Procedures), which should document the level of oversight necessary. Critical Any time a technical change is made to equipment that supports critical and essential emergency services, a detailed step by step procedure needs to be written and followed explicitly in order to preclude unplanned service failures that may be caused by technical ignorance, carelessness, accident and/or incomplete work activity. '7 7 5046 Network Operators and Property Managers should ensure critical infrastructure utility vaults are secured from unauthorized access. Highly Important '7 7 5199 Network Operators and Service Providers should provide appropriate protection for outside plant equipment (e.g., Controlled Environmental Vault, remote terminals) against tampering and should consider monitoring certain locations against intrusion. Highly Important '7 7 5048 Network Operators, Service Providers and Equipment Suppliers should establish and implement a policy that requires approval by senior member(s) of the security department for security related goods and services contracts. Important '7 7 5121 Network Operators, Service Providers and Equipment Suppliers should develop and consistently implement software delivery procedures that protect the integrity of the delivered software in order to prevent software loads from being compromised during the delivery process. Important 9

Working Group 6 Executive Summary Provided recommendations to approve 22 of the 23 proposed and modified BPs that the Network Reliability Steering Committee submitted to CSRIC Network Reliability Steering Committee Modified & Proposed Best Practices ***SAMPLE SPREADSHEET*** Number Modified or New Wording CSRIC Working Group 6 Recommendation (Approve/Reject) '7 P 0472 Modified Network Operators and Equipment Suppliers should consider connector choices and color coding to prevent inappropriate combinations of RF cables. '7 P 0782 New Network Operators and Service Providers should detect DS3 simplex events and restore the duplex protective path expeditiously by executing appropriate incident response and escalation processes. Approve Approve Presented proposals for identifying, contacting, and educating appropriate users within the communications industry about the value of the BPs and approaches to implement them Outlined various approaches that the FCC and communications industry organizations may consider to increase the utilization of the BPs 10

Working Group 6 Recommendations 5.1 Network Operators, Service Providers, Equipment Suppliers, Property Managers, and Public Safety Organizations should: Evaluate BPs Implement BPs where appropriate Institutionalize the periodic review of BPs 5.2 Use of BPs is Voluntary, Not Mandatory Varying applicability of BPs to industry sectors Varying applicability of BPs to organizations within sectors Brief or general wording of some BPs Organizations have limited resources 11

Working Group 6 Recommendations 5.3. FCC Should Continue to Encourage the Use of BPs by the Communications Industry History of supporting industry s development and use of BPs Network Reliability and Interoperability Council (NRIC) Media Security and Reliability Council (MSRC) Network Reliability Steering Committee (NRSC) 5.4 Revise BPs to Track Industry Advances Significant changes in industry since BPs were drafted New technologies, new capabilities Comments offered on some BPs 12

Working Group 6 Recommendations 5.5 Update BPs Frequently Advancements in theory, system design, fabrication, and operation are accelerating BPs should be updated at least every 2 years to keep pace with new developments 5.6 Create BPs for Network Interoperability Existing BPs do not address network interoperability Network interoperability is now a priority New BPs should be developed addressing this subject 13

Working Group 6 Recommendations 5.7 Create BPs to Address Emerging Risks Long standing risks are well understood Emerging risks present great uncertainty Persons using today s knowledge and tools Vulnerabilities in design and operation of newer networks Reassess and augment BPs to address the emerging risks and threats 5.8 Update BPs on E 911 for Data Applications Existing BPs on E 911 address interruption in transmission of voice communications more than data Modify or establish new BPs for avoiding and minimizing interruptions in data transmissions and for speeding restoration of data service 14

Working Group 6 Recommendations 5.9 Add BPs on Accessibility Under the Americans with Disabilities Act (ADA) Existing BPs on E 911 do not address accessibility considerations, gaps, or compliance with ADA Identify and address these issues to ensure that persons with disabilities have direct access to 911 services in preferred communications modalities Align new BPs with future findings of Emergency Access Advisory Committee (EAAC) and Video Programming and Emergency Access Advisory Committee (VPEAAC) 5.10 Merge Current BPs with the New Best Practices Developed by CSRIC New BPs have been developed by several CSRIC Working Groups These should be reconciled and merged with the existing BPs 15

Working Group 6 Recommendations 5.11 Clarify Wording of BPs As presently worded, some BPs include multiple concepts Improve utility by re wording and reorganizing BPs Use NRSC guidelines for developing BPs 5.12 Reassess Utility of BP Search Engines NRIC search engine unchanged for ~10 years Bell Labs search engine unchanged for ~1 year Reassess design and operation of search engines to determine if they can be refined to deliver enhanced performance 16

Working Group 6 Recommendations 5.13 Develop Web Based Training on BPs Create a tutorial about BPs and how to use them Use brief training modules Development should be done by 3rd party experts Hosting should be provided by an independent industry organization Development of an additional on line tool (e.g., webinar) 5.14 Prepare a White Paper about BPs Draft an overview document for key executive and operations personnel Have an independent organization prepare it, with FCC assistance Distribute it electronically and via hard copy 17

Working Group 6 Recommendations 5.15 Live Presentations About BPs Use industry events of CEA, CTIA, TIA, ATIS, NCTA, IEEE, and others Presentations by speakers with career experience using BPs Panels, break out sessions, inclusion on events education tracks 5.16 Consider a Survey to Gather Data About BP Use Encourage knowledge and use of BPs Learn about extent of use in various industry sectors Learn what factors inhibit use of BPs Use survey data to refine and improve BP content, database, etc. Aid development of other BP education initiatives 18

Working Group 6 Conclusion Working Group 6 performed the following: Reviewed over 800 Best Practices and classified each as Critical, Highly Important, or Important. Identified 114 of these BPs as the most critical for enhancing the security, reliability, operability, and resiliency of the communications industry s infrastructure and operations. Developed recommendations and proposals to educate executives and staff of network operators, service providers, equipment suppliers, property managers, and public safety authorities about the availability of the BPs, to encourage their use, and to assist with their implementation. Recommend that CSRIC members vote to approve Working Group 6 s Final Report 19