Commodity Futures Trading Commission: Vol. 80 Wednesday, No. 246 December 23, 2015
Commodity Futures Trading Commission: Vol. 80 Wednesday, No. 246 December 23, 2015
Commodity Futures Trading Commission: Vol. 80 Wednesday, No. 246 December 23, 2015
80
Wednesday,
No. 246
Part IV
17 CFR Part 39
System Safeguards Testing Requirements for Derivatives Clearing
Organizations; Proposed Rule
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00001
Fmt 4717
Sfmt 4717
E:\FR\FM\23DEP3.SGM
23DEP3
80114
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
SUMMARY:
VerDate Sep<11>2014
Jkt 238001
U.S.C. 7a1.
Clearing Organization General
Provisions and Core Principles, 76 FR 69334 (Nov.
8, 2011) (codified at 17 CFR part 39).
3 Core Principle I requires a DCO to: (1) Establish
and maintain a program of risk analysis and
oversight to identify and minimize sources of
operational risk; (2) establish and maintain
emergency procedures, backup facilities, and a plan
for disaster recovery that allows for the timely
recovery and resumption of the DCOs operations
and the fulfillment of each of its obligations and
responsibilities; and (3) periodically conduct tests
to verify that the DCOs backup resources are
sufficient.
2 Derivatives
PO 00000
Frm 00002
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00003
Fmt 4701
Sfmt 4702
80115
at 6266, 7779.
at 2526.
24 Id. at 4857.
25 Id. at 4546.
26 Id. at 8084.
23 Id.
E:\FR\FM\23DEP3.SGM
23DEP3
80116
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
253.
29 44
U.S.C. 3544(b)(5).
Framework for Improving Critical
Infrastructure Cybersecurity, Feb. 2014, v.1,
Subcategory PR.IP10, p. 28, and Category DE.DP,
p. 31, available at: http://www.nist.gov/
cyberframework/upload/cybersecurity-framework021214.pdf.
31 FINRA, Report on Cybersecurity Practices, Feb.
2015 (FINRA Report), pp. 12, available at:
https://www.finra.org/sites/default/files/p602363
%20Report%20on%20Cybersecurity%20
Practices_0.pdf.
32 Id. at 8.
33 Council on Cybersecurity, The Critical Security
Controls for Effective Cyber Defense, v. 5.1
(Council on Cybersecurity), p. 28, available at:
http://www.counciloncybersecurity.org/bcmsmedia/Files/Download?id=a52977d7-a0e7-462ea4c0-a3bd01512144.
30 NIST,
VerDate Sep<11>2014
Jkt 238001
at 102.
36 Id.
37 Id.
at 103.
FFIEC includes the Board of Governors of
the Federal Reserve System, the Federal Deposit
Insurance Corporation, the Office of the
Comptroller of the Currency, the Consumer
Financial Protection Bureau, the National Credit
Union Administration, and the State Liaison
Committee of the Conference of State Bank
Supervision.
39 See FFIEC, E-Banking Booklet: IT Examination
Handbook, Aug. 2003, p. 30, available at: http://
ithandbook.ffiec.gov/ITBooklets/FFIEC_ITBooklet_
E-Banking.pdf.
38 The
PO 00000
Frm 00004
Fmt 4701
Sfmt 4702
implementation of appropriate
prevention and detection procedures.40
Cybersecurity testing is also
supported internationally. IOSCO has
emphasized the importance of testing to
ensure effective controls, in light of
risks posed by the complexity of
markets caused by technological
advances.41 According to IOSCO,
regulatory authorities have also
recognized the need for [t]rading
[v]enues to appropriately monitor
critical systems and have appropriate
control mechanisms in place. 42
Similarly, the European Securities and
Markets Authority (ESMA) guidelines
for automated trading systems call for
trading platforms to test trading systems
and system updates to ensure that
systems meet regulatory requirements,
that risk management controls work as
intended, and that the systems can
function effectively in stressed market
conditions.43 Further, the Principles for
Financial Market Infrastructures
published by the Bank for International
Settlements Committee on Payments
and Market Infrastructures (CPMI)
and IOSCOs Technical Committee
(together, CPMIIOSCO) note that
with respect to operational risks, which
include cyber risk, [a financial market
infrastructure]s arrangements with
participants, operational policies, and
operational procedures should be
periodically, and whenever necessary,
tested and reviewed, especially after
significant changes occur to the system
or a major incident occurs. . . . 44 The
Commission also notes that
39.18(j)(1)(i) currently requires DCOs
to conduct regular, periodic, and
objective testing and review of their
automated systems to ensure that these
systems are reliable, secure, and have
adequate scalable capacity. Finally, the
Commission notes that this requirement
must be satisfied by following, at a
40 See PricewaterhouseCoopers, Insurance 2020
and Beyond: Reaping the Dividends of Cyber
Resilience, 2015, available at: http://www.pwc.com/
gx/en/insurance/publications/assets/reapingdividends-cyber-resilience.pdf.
41 IOSCO Consultation Report, Mechanisms for
Trading Venues to Effectively Manage Electronic
Trading Risks and Plans for Business Continuity,
Apr. 2015, p. 3, available at: https://www.iosco.org/
library/pubdocs/pdf/IOSCOPD483.pdf.
42 Id. at 9.
43 ESMA, Guidelines: Systems and controls in an
automated trading environment for trading
platforms, investment firms and competent
authorities, Feb. 24, 2012, p. 7, available at: http://
www.esma.europa.eu/system/files/
esma_2012_122_en.pdf.
44 CPMIIOSCO, Principles for Financial Market
Infrastructures, Apr. 2012, at 96, available at: http://
www.iosco.org/library/pubdocs/pdf/
IOSCOPD377.pdf. See also CPMI, Cyber resilience
in financial market infrastructures, Nov. 2014,
available at: http://www.bis.org/cpmi/publ/
d122.pdf.
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
minimum, generally accepted standards
and industry best practices.45 As further
explained below, the proposed rules
would clarify existing system safeguards
requirements by identifying relevant
generally accepted standards and
industry best practices. With few
exceptions, such as requirements for
independent contractors to conduct
certain testing, the Commission is not
changing the regulatory requirement for
DCOs as it exists today.
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00005
Fmt 4701
Sfmt 4702
80117
E:\FR\FM\23DEP3.SGM
23DEP3
80118
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00006
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
the potential damage this type of
attacker could cause.76
In addition, generally accepted
2. Penetration Testing
standards and industry best practices
support annual penetration testing. For
Though complementary to
vulnerability testing, penetration testing example, NIST calls for at least annual
differs from vulnerability testing in that penetration testing of an organizations
network and systems.77 Moreover, the
its purpose is to identify ways that the
vulnerabilities identified above could be FFIEC calls for independent penetration
exploited.70 In other words, penetration testing of high risk systems at least
annually, and for quarterly testing and
testing attempts to exploit cyber and
verification of the efficacy of firewall
automated system vulnerabilities, and
78
subjects the system to real-world attacks and access control defenses. Data
security
standards
for
the
payment
card
by testing personnel in order to identify
industry provide that entities should
both the extent to which an attacker
could compromise the system before the perform both external and internal
penetration testing at least annually, as
organization detects and counters the
well as after any significant network
attack, and the effectiveness of the
changes, new system component
organizations response mechanisms.71
installations, firewall modifications, or
NIST defines penetration testing as
product upgrades.79
[a] test methodology in which
The primary benefit of a penetration
assessors, typically working under
test is that it identifies the extent to
specific constraints, attempt to
which a system can be compromised
circumvent or defeat the security
before the attack is identified and
72
features of an information system. As assesses the effectiveness of the
noted in the FINRA Report, [a]n
response mechanism.80 Accordingly,
advanced persistent attack may involve
the Commission is proposing to require
an outsider gaining a progressively
both external and internal penetration
greater foothold in a firms environment, testing. In 39.18(a), the Commission
effectively becoming an insider in the
proposes to define external penetration
process. For this reason, it is important
testing as attempts to penetrate a
to perform penetration testing against
DCOs automated systems or networks
both external and internal interfaces and from outside the system and network
systems. 73 As further explained,
boundaries to identify and exploit
external security testing is conducted
vulnerabilities (including, but not
from outside the organizations security limited to, methods for circumventing
perimeter[, which] offers the ability to
the security features of an application,
view the environments security posture system, or network).81 Proposed
as it appears outside the security
39.18(e)(3) would require external
perimeterusually as seen from the
penetration testing to be conducted at a
Internetwith the goal of revealing
frequency determined by an appropriate
vulnerabilities that could be exploited
risk analysis, but no less frequently than
by an external attacker. 74 Internal
annually.82 The Commission proposes
penetration testing, on the other hand,
to define internal penetration testing
is conducted from the internal network in 39.18(a) as attempts to penetrate a
and [assessors] assume the identity of a
DCOs automated systems or networks
trusted insider or an attacker who has
from inside the system and network
penetrated the perimeter defenses. 75
boundaries to identify and exploit
Internal penetration testing can
76 See NIST SP 800115, supra note 52, at 25.
therefore reveal vulnerabilities that
77 Id. at 56.
could be exploited, and demonstrates
appropriate in todays cybersecurity
environment.
78 FFIEC
70 See
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00007
Fmt 4701
Sfmt 4702
80119
at 2.
the 15 DCOs currently registered with the
Commission, four also are registered with the SEC
as clearing agencies: Chicago Mercantile Exchange,
Inc. (CME), ICE Clear Credit LLC, ICE Clear
Europe Limited, and Options Clearing Corporation.
However, on August 3, 2015, CME filed with the
SEC a written request to withdraw from registration
as a clearing agency. See Securities Exchange Act
Release No. 3475762 (Aug. 26, 2015), 80 FR 52815
(Sept. 1, 2015).
85 17 CFR 240.1003. The SEC noted in its
adopting release that SCI entities may, however,
determine that based on its [sic] risk assessment, it
is appropriate and/or necessary to conduct such
penetration test reviews more frequently than once
every three years. Regulation Systems Compliance
and Integrity, 79 FR 72252, 72344 (Dec. 5, 2014).
86 NIST SP 80053, supra note 47, app. FCA at
F62.
84 Of
E:\FR\FM\23DEP3.SGM
23DEP3
80120
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
3. Controls Testing
Controls provide reasonable assurance
that security management is effective,
and adequate control testing is therefore
critical to ensuring the confidentiality,
integrity, and availability of information
and information systems.89 Regular,
ongoing testing of all of an
organizations system safeguards-related
controls for these purposes is a crucial
part of a DCOs risk analysis and
oversight program.90
Generally accepted standards and
industry best practices call for
organizations to conduct regular,
ongoing controls testing that over time
includes testing of all their system
safeguards-related controls. For
example, NIST calls for organizations to
assess the security controls in the
information system and its environment
of operation to determine the extent to
which the controls are implemented
correctly, operating as intended, and
producing the desired outcome with
respect to meeting established security
requirements. 91 NIST notes that the
results of such testing can allow
organizations to, among other things,
identify potential cybersecurity
problems or shortfalls, identify securityrelated weaknesses and deficiencies,
prioritize risk mitigation decisions and
activities, confirm that weaknesses and
deficiencies have been addressed, and
inform related budgetary decisions and
capital investment.92 FFIEC calls for
controls testing because [c]ontrols
should not be assumed to be completely
effective, and states that a controls
testing program is sound industry
practice and should be based on an
assessment of the risk of non87 FFIEC Handbook, supra note 57, at 81 (noting
that [i]ndependence provides credibility to the test
results).
88 See, e.g., PCIDSS, supra note 54, at 97.
89 See generally U.S. Govt Accountability Office,
GAO09232G, Federal Information System
Controls Audit Manual, Feb. 2009, available at:
http://www.gao.gov/assets/80/77142.pdf.
90 See generally 17 CFR 39.18 and 17 CFR 39.34.
91 NIST SP 80053, supra note 47, app. FCA at
F55.
92 NIST Special Publication 80053A, Assessing
Security and Privacy Controls in Federal
Information Systems and Organizations, rev. 4
(NIST SP 80053A), p. 3, available at: http://
nvlpubs.nist.gov/nistpubs/SpecialPublications/
NIST.SP.800-53Ar4.pdf.
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00008
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00009
Fmt 4701
Sfmt 4702
80121
E:\FR\FM\23DEP3.SGM
Continued
23DEP3
80122
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
19.
116 See, e.g., FINRA Report, supra note 31, at 14
(stating that firms conducting defined risk
assessment processes do so either annually or on an
ongoing basis throughout the year, in either case
culminating in an annual risk assessment report).
117 See, e.g., PCIDSS, supra note 54, at 100.
118 FFIEC Handbook, supra note 57, at 86.
PO 00000
Frm 00010
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
123 Id.
124 FFIEC
125 Id.
VerDate Sep<11>2014
Jkt 238001
80123
1. Definitions
PO 00000
Frm 00011
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
80124
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00012
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
FR 69334.
VerDate Sep<11>2014
Jkt 238001
U.S.C. 19(a).
example, to quantify benefits such as
enhanced protections for market participants and
the public and financial integrity of the futures and
swaps markets would require information, data
and/or metrics that either do not exist, or to which
the Commission generally does not have access.
137 For
PO 00000
Frm 00013
Fmt 4701
Sfmt 4702
80125
E:\FR\FM\23DEP3.SGM
Continued
23DEP3
80126
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00014
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
authenticated basis, or, where not
conducted on an authenticated basis, to
implement compensating controls.147
The Commission notes that industry
best practices specifically recommend
authenticated scanning.148 Likewise,
current 39.18 requires DCOs to
conduct authenticated scanning and
Commission staff has examined DCOs
for compliance with such requirement.
Accordingly, the Commission does not
believe that DCOs will incur additional
costs as a result of the adoption of
proposed 39.18(e)(2)(ii).
Under proposed 39.18(e)(2)(iii), for
at least two of the required quarterly
vulnerability tests each year,
vulnerability testing must be conducted
by an independent contractor. However,
the remaining two vulnerability tests
may be conducted by a DCOs
employees so long as those employees
are not responsible for development or
operation of the systems or capabilities
being tested.149 The Commission notes
that at least 9 of the 13 DCOs
responding to the February 2015 DCR
Survey currently conduct at least some
of their vulnerability testing using
independent contractors. The
Commission does not, however, have
quantification or estimation of the costs
associated with proposed
39.18(e)(2)(iii). Nonetheless, in
qualitative terms, the Commission
recognizes that, compared to the status
quo, this proposed requirement may
impose some costs on DCOs equal to the
difference between conducting
vulnerability testing in-house and hiring
an independent contractor. In
particular, these proposed regulations
may require DCOs to establish and
implement internal policies and
procedures that are reasonably designed
to address the workflow associated with
the test, which may include the
communication and cooperation
between the entity and independent
contractor, communication and
cooperation between the entitys legal,
business, technology, and compliance
departments, appropriate authorization
to remediate vulnerabilities identified
by the independent contractor,
implementation of the measures to
address such vulnerabilities, and
verification that these measures are
effective and appropriate. The
Commission requests comment on the
potential costs of proposed
147 See
text.
148 See, e.g., NIST SP 80053, supra note 47, at
F154 (Privileged access authorization to selected
system components facilitates more thorough
vulnerability scanning and also protects the
sensitive nature of such scanning.).
149 See supra section II.A.1.
VerDate Sep<11>2014
Jkt 238001
80127
c. Regulation 39.18(e)(3)External
Penetration Testing
(iii) Benefits
150 PCIDSS
3.
PO 00000
Frm 00015
Fmt 4701
Sfmt 4702
(ii) Costs
The Commission believes that the
scope requirement of proposed
39.18(e)(3) will not impose new costs
on DCOs. Comprehensive external
penetration testing is an industry best
practice 151 and, based on the
representations made by DCOs to
Commission staff in administering the
Commissions examination program and
DCO responses to the February 2015
DCR Survey, the Commission believes
that most DCOs are currently
conducting external penetration testing
sufficient to meet the scope
requirements of proposed 39.18(e)(3).
In addition, the Commission believes
that the frequency requirement of
proposed 39.18(e)(3)(i) will not impose
new costs on DCOs. The Commission
notes that industry best practices
specifically state that external
penetration testing should be conducted
at least annually. 152 Therefore
current Commission regulations require
annual penetration testing. Moreover,
the Commission notes that at least 11 of
the 13 DCOs responding to the February
2015 DCR Survey conduct, at a
minimum, annual external penetration
testing, with two DCOs responding that
they conduct periodic external
penetration testing.
151 See, e.g., NIST SP 80053, supra note 47, app.
FCA at F62; FFIEC Handbook, supra note 57, at
81; PCIDSS, supra note 54, at 9697; see also
section II.A.2.
152 See, e.g., PCIDSS, supra note 54, at 9697;
see also section II.A.2.
E:\FR\FM\23DEP3.SGM
23DEP3
80128
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00016
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
The Commission also believes that
internal penetration testing strengthens
DCOs systems, thereby protecting
clearing members and their customers
from a disruption in clearing services,
which could potentially disrupt the
functioning of the broader financial
markets.
The Commission requests comments
on the potential benefits to a DCO in
complying with all aspects of proposed
39.18(e)(4), and any benefits that
would be realized by members of DCOs
and their customers, as well as other
market participants or the financial
system more broadly. The Commission
specifically requests comment on
alternative means to address these
issues, and the benefits associated with
such alternatives.
e. Regulation 39.18(e)(5)Controls
Testing
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00017
Fmt 4701
Sfmt 4702
80129
E:\FR\FM\23DEP3.SGM
23DEP3
80130
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
f. Regulation 39.18(e)(6)Security
Incident Response Plan Testing
(i) Summary of Proposed Regulations
As discussed above in section II(A)(4),
proposed 39.18(a) defines security
incident response plan testing as testing
of a DCOs security incident response
plan to determine the plans
effectiveness, identifying its potential
weaknesses or deficiencies, enabling
regular plan updating and improvement,
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00018
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
The Commission requests comments
on the potential benefits to a DCO in
complying with all aspects of proposed
39.18(e)(6), and any benefits that
would be realized by members of DCOs
and their customers, as well as other
market participants or the financial
system more broadly. The Commission
specifically requests comment on
alternative means to address these
issues, and the benefits associated with
such alternatives.
g. Regulation 39.18(e)(7)Enterprise
Technology Risk Assessment
165 See,
VerDate Sep<11>2014
Jkt 238001
166 See
167 PCIDSS,
PO 00000
Frm 00019
Fmt 4701
Sfmt 4702
80131
E:\FR\FM\23DEP3.SGM
23DEP3
80132
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
(iii) Benefits
The Commission believes that
internal reporting and review are an
essential component of a comprehensive
and effective system safeguard program.
While senior management and the
DCOs board of directors may have to
devote resources to reviewing testing
and assessment reports, active
supervision by these individuals
promotes responsibility and
accountability by ensuring they receive
and review the results of all system
safeguard testing and assessments,
thereby affording them the opportunity
to evaluate the effectiveness of the
testing and assessment protocols.
Moreover, the attention by the board of
directors and senior management
should help to promote a focus on such
reviews and issues, and enhance
communication and coordination
regarding such reviews and issues
among the business, technology, legal,
and compliance personnel of the DCO.
Such focus could cause a DCO to
internalize and/or more appropriately
allocate certain costs that would
otherwise be borne by clearing
members, customers of clearing
members, and other relevant
stakeholders. Active supervision by
senior management and the board of
directors also promotes a more efficient,
effective, and reliable DCO risk
management and operating structure.
Consequently, the DCO should be better
positioned to strengthen the integrity,
resiliency, and availability of its
automated systems.
The Commission requests comments
on the potential benefits to a DCO in
complying with all aspects of proposed
39.18(e)(9), and any benefits that
would be realized by members of DCOs
and their customers, as well as other
market participants or the financial
system more broadly. The Commission
specifically requests comment on
alternative means to address these
issues, and the benefits associated with
such alternatives.
168 See
VerDate Sep<11>2014
j. Regulation 39.18(e)(10)Remediation
Jkt 238001
PO 00000
Frm 00020
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
systemic risk, which protect market
participants and the public from the
adverse consequences that would result
from a DCOs failure or a disruption in
its functioning.
b. Efficiency, Competitiveness and
Financial Integrity
The proposed amendments to 39.18
would help preserve the efficiency and
financial integrity of the derivatives
markets by promoting comprehensive
oversight and testing of a DCOs
operations and automated systems.
Specifically, the proposed amendments
will further reduce the probability of a
cyber attack that could lead to a
disruption in clearing services which
could, in turn, cause disruptions to the
efficient functioning and financial
integrity of the derivatives markets.
Preventing cyber attacks could prevent
monetary losses to DCOs, and thereby
help protect their financial integrity.
The Commission does not anticipate
the proposed amendments to have a
significant impact on the
competitiveness of the derivatives
markets.
c. Price Discovery
The Commission does not anticipate
the proposed amendments to 39.18 to
have a direct effect on the price
discovery process. However, ensuring
that DCOs automated systems function
properly to clear trades protects the
price discovery process to the extent
that a prolonged disruption or
suspension in clearing at a DCO may
cause potential market participants to
refrain from trading.
d. Sound Risk Management Practices
The proposed amendments to 39.18
would strengthen and promote sound
risk management practices across DCOs.
Specifically, the proposed amendments
would build upon the current system
safeguards requirements by ensuring
that tests of DCOs key system
safeguards are conducted at minimum
intervals and, where appropriate, by
independent professionals. The
applicable tests are each recognized by
industry best practices as essential
components of a sound risk
management program. Moreover, the
benefits of the proposed rules will be
shared by market participants and the
investing public as DCOs, by their
nature, serve to provide such parties
with counterparty credit risk protection.
In addition, reliably functioning
computer systems and networks are
crucial to comprehensive risk
management, and being able to request
reports of the system safeguards testing
required by the proposed regulations
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00021
Fmt 4701
Sfmt 4702
80133
39.18
System safeguards.
E:\FR\FM\23DEP3.SGM
23DEP3
80134
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00022
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
fulfillment of each obligation and
responsibility of the derivatives clearing
organization, including, but not limited
to, the daily processing, clearing, and
settlement of transactions, following any
disruption of its operations.
(2) Recovery time objective. A
derivatives clearing organizations
business continuity and disaster
recovery plan, as described in paragraph
(c)(1) of this section, shall have, and the
derivatives clearing organization shall
maintain physical, technological, and
personnel resources sufficient to meet, a
recovery time objective of no later than
the next business day following a
disruption.
(3) Coordination of plans. A
derivatives clearing organization shall,
to the extent practicable:
(i) Coordinate its business continuity
and disaster recovery plan with those of
its clearing members, in a manner
adequate to enable effective resumption
of daily processing, clearing, and
settlement of transactions following a
disruption;
(ii) Initiate and coordinate periodic,
synchronized testing of its business
continuity and disaster recovery plan
with those of its clearing members; and
(iii) Ensure that its business
continuity and disaster recovery plan
takes into account the plans of its
providers of essential services,
including telecommunications, power,
and water.
(d) Outsourcing. (1) A derivatives
clearing organization shall maintain the
resources required under paragraphs
(b)(4) and (c)(1) of this section either:
(i) Using its own employees as
personnel, and property that it owns,
licenses, or leases; or
(ii) Through written contractual
arrangements with another derivatives
clearing organization or other service
provider.
(2) Retention of responsibility. A
derivatives clearing organization that
enters into a contractual outsourcing
arrangement shall retain complete
responsibility for any failure to meet the
requirements specified in paragraphs (b)
and (c) of this section. The derivatives
clearing organization must employ
personnel with the expertise necessary
to enable it to supervise the service
providers delivery of the services.
(3) Testing of resources. The testing
referred to in paragraph (e) of this
section shall apply to all of the
derivatives clearing organizations own
and outsourced resources, and shall
verify that all such resources will work
together effectively. Where testing is
required to be conducted by an
independent contractor, the derivatives
clearing organization shall engage a
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00023
Fmt 4701
Sfmt 4702
80135
E:\FR\FM\23DEP3.SGM
23DEP3
80136
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00024
Fmt 4701
Sfmt 4702
E:\FR\FM\23DEP3.SGM
23DEP3
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
applies the same standards to other critical
market infrastructure.
Since the 2009 G20 agreement and the
enactment of Dodd-Frank, clearinghouses
have become increasingly important the
financial system. As a result, I believe we
must do all we can to ensure their strength
and stability. This proposed rule is a critical
component of this effort.
I thank the staff for their hard work on this
proposal. Of course, we welcome public
comment on both our system safeguards
proposals, which will be carefully taken into
account before we take any final action.
Appendix 3Statement of
Commissioner Sharon Y. Bowen
VerDate Sep<11>2014
Jkt 238001
PO 00000
Frm 00025
Fmt 4701
Sfmt 4702
80137
E:\FR\FM\23DEP3.SGM
23DEP3
80138
Federal Register / Vol. 80, No. 246 / Wednesday, December 23, 2015 / Proposed Rules
VerDate Sep<11>2014
Jkt 238001
www.nist.gov/cyberframework/upload/
cybersecurity-framework-021214.pdf.
PO 00000
Frm 00026
Fmt 4701
Sfmt 9990
E:\FR\FM\23DEP3.SGM
23DEP3